JSConstraintDebug.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6778f0ff0d4688e11fe6906e2bfaae10N.exe
Resource
win10v2004-20240709-en
General
-
Target
6778f0ff0d4688e11fe6906e2bfaae10N.exe
-
Size
1.2MB
-
MD5
6778f0ff0d4688e11fe6906e2bfaae10
-
SHA1
d5553ef24855af2d4e6c4811dbe68c8c678c2574
-
SHA256
0088411691209d9bffb48270083bdd0270a143059d017538a7e3e8fe4d23b85c
-
SHA512
348ec1fd93ffbd5ad07c873a58a143dbfa0be221255e7c3ba0433ff5d42f3e1b119afc0512686562b6dfc17be34c5aa1d856293f2ef5eebb2a6076c303f3bafd
-
SSDEEP
12288:FO8u4+/x8J7ct3z5htUcQ1MlhrmQgwwJzt5+7fyZkCtXFiWZF/3o:FO8u4+mIJz5IcuMlQHJxrDiSi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6778f0ff0d4688e11fe6906e2bfaae10N.exe
Files
-
6778f0ff0d4688e11fe6906e2bfaae10N.exe.exe windows:10 windows x64 arch:x64
92ff1a2ee96a9db398bb15f6ff6228a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
OpenProcessToken
GetTokenInformation
RegQueryInfoKeyW
RegEnumValueW
RegGetValueW
kernel32
WaitForSingleObject
CreateProcessW
CopyFileExW
WideCharToMultiByte
VerifyVersionInfoW
VerSetConditionMask
GetPrivateProfileStringW
GetFileAttributesW
GetPrivateProfileSectionW
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
TerminateProcess
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
Sleep
GetLastError
GetCurrentProcess
msvcrt
memmove
memcpy
??1type_info@@UEAA@XZ
?terminate@@YAXXZ
_commode
_fmode
__C_specific_handler
_initterm
__setusermatherr
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
_XcptFilter
_callnewh
??0exception@@QEAA@AEBQEBDH@Z
malloc
_CxxThrowException
tolower
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
printf
__CxxFrameHandler3
??3@YAXPEAX@Z
wcstok_s
wcsstr
_vsnwprintf
_wcsicmp
iswspace
_purecall
wcsrchr
memset
oleaut32
SysFreeString
prntvpt
ord6
ord2
ord10
ord9
ord8
ord7
shlwapi
SHCreateStreamOnFileW
ord12
winspool.drv
OpenPrinterW
ClosePrinter
GetPrinterW
GetPrinterDriverW
GetPrinterDriverDirectoryW
GetPrinterDataW
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE