e:\sdgxxebiso.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6697ab1f3fcfade478d874c091f3b520N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6697ab1f3fcfade478d874c091f3b520N.exe
Resource
win10v2004-20240709-en
General
-
Target
6697ab1f3fcfade478d874c091f3b520N.exe
-
Size
517KB
-
MD5
6697ab1f3fcfade478d874c091f3b520
-
SHA1
ab4a4cd3c25e22b69a019621105a264c7dec0117
-
SHA256
3aec16816833ba0d0d545fc24ebac17c80bc9d42999931e6551797fe2b3bf48f
-
SHA512
6507068019cf39e9fa229b53d8cb691d382ffe87fa01fe68606075dc16c3440a9f9b68e475d0cc871262d203c8853b993dedb51fa45fefdc442df345db4f3c73
-
SSDEEP
12288:KUdJygTBdpFjJcjZ/CsL8cyUz51MW829pyNyryKjgwrf5W:KUdgYbpFijn801O2fYyOmf5W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6697ab1f3fcfade478d874c091f3b520N.exe
Files
-
6697ab1f3fcfade478d874c091f3b520N.exe.exe windows:4 windows x86 arch:x86
5c1c93faa7ca63b69ad060311a5183a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetConfirmZoneCrossingW
SetUrlCacheEntryInfoW
FindNextUrlCacheEntryExA
SetUrlCacheEntryInfoA
InternetSetCookieA
kernel32
SetConsoleCtrlHandler
GetStringTypeW
InterlockedExchange
GetACP
VirtualAlloc
GetStartupInfoA
FreeLibrary
TlsGetValue
LeaveCriticalSection
GetStringTypeA
LoadLibraryA
CreateFileA
GetSystemTimeAsFileTime
GetLastError
GetConsoleOutputCP
QueryPerformanceCounter
FreeEnvironmentStringsW
ReadFile
EnumSystemLocalesA
WriteConsoleA
GetEnvironmentStrings
DeleteCriticalSection
GetOEMCP
CreateMailslotW
GetEnvironmentStringsW
GetFileAttributesW
Sleep
CloseHandle
InterlockedIncrement
TlsFree
GetUserDefaultLCID
TerminateProcess
GetFileType
CompareStringA
GetLocaleInfoW
GetTickCount
VirtualFree
FreeEnvironmentStringsA
LCMapStringA
WriteFile
GetDateFormatA
RtlUnwind
GetCurrentProcessId
GetModuleHandleA
InterlockedDecrement
SetFilePointer
OpenMutexA
MapViewOfFileEx
HeapCreate
HeapReAlloc
SetUnhandledExceptionFilter
HeapDestroy
GetCurrentThread
GetCurrentThreadId
GetTimeFormatA
GetModuleFileNameA
FlushFileBuffers
GetCurrentProcess
SetStdHandle
CompareStringW
GetStartupInfoW
GetCommandLineA
TlsAlloc
GetModuleFileNameW
IsDebuggerPresent
GlobalFlags
InitializeCriticalSection
GetConsoleCP
HeapAlloc
TlsSetValue
WriteConsoleW
CreateMutexA
GetLocaleInfoA
GetTimeZoneInformation
SetEnvironmentVariableA
GetCPInfo
VirtualQuery
GetProcAddress
GlobalAddAtomW
MultiByteToWideChar
HeapSize
GetStdHandle
GetCommandLineW
SetLastError
LCMapStringW
EnterCriticalSection
ExitProcess
GetProcessHeap
SetHandleCount
HeapFree
GetVersionExA
GetConsoleMode
IsValidLocale
GetProcessAffinityMask
GlobalGetAtomNameW
WideCharToMultiByte
IsValidCodePage
UnhandledExceptionFilter
user32
AdjustWindowRectEx
GetProcessWindowStation
RegisterClassA
RegisterClassExA
IsRectEmpty
IsCharUpperA
GetProcessDefaultLayout
DdeGetData
ChangeDisplaySettingsExW
CharToOemW
comctl32
InitCommonControlsEx
gdi32
SetDeviceGammaRamp
GetCharacterPlacementW
ResizePalette
SetBoundsRect
GdiSetBatchLimit
CombineRgn
GetCharWidth32W
CheckColorsInGamut
LineTo
EndPage
CreateEllipticRgnIndirect
Pie
CreateICA
GetTextCharsetInfo
PolylineTo
PtInRegion
ExtCreatePen
EnumMetaFile
EnumFontFamiliesExW
SetICMMode
AddFontResourceA
StrokeAndFillPath
CreatePalette
GetObjectType
advapi32
InitiateSystemShutdownW
GetUserNameW
AbortSystemShutdownA
RevertToSelf
LookupPrivilegeDisplayNameW
RegOpenKeyW
StartServiceA
Sections
.text Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ