C:\Source\openoffice\main\registry\wntmsci12.pro\bin\regview.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d066b6e9a0d75b1b029b040f20e42e4ef2facbbb41fa249bfb0efc24782116c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0d066b6e9a0d75b1b029b040f20e42e4ef2facbbb41fa249bfb0efc24782116c.exe
Resource
win10v2004-20240709-en
General
-
Target
0d066b6e9a0d75b1b029b040f20e42e4ef2facbbb41fa249bfb0efc24782116c
-
Size
28KB
-
MD5
1762036f85bb182b3d6d20d9aee0e4c0
-
SHA1
c6321e92817e82d951409d1ef9995628346f867c
-
SHA256
0d066b6e9a0d75b1b029b040f20e42e4ef2facbbb41fa249bfb0efc24782116c
-
SHA512
88c2d4ea328894bd58877911521e0eb5dc3e012abf30020e8b0dfab5bd6ce7918a51a53ecceee7513c14a4866d6aab77e4ffaa61ba6dc6588e055c3a839b129a
-
SSDEEP
768:mbKaz6v+vOInzqG8QGPL4vzZq2o9W7GsxBbPr:mbKyOGTfGCq2iW7z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d066b6e9a0d75b1b029b040f20e42e4ef2facbbb41fa249bfb0efc24782116c
Files
-
0d066b6e9a0d75b1b029b040f20e42e4ef2facbbb41fa249bfb0efc24782116c.exe windows:5 windows x86 arch:x86
86caff84a2371c5e0dc504ee505264f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
sal3
osl_getThreadTextEncoding
osl_getProcessWorkingDir
osl_getFileURLFromSystemPath
osl_getAbsoluteFileURL
rtl_string2UString
rtl_uString_acquire
rtl_uString_new
rtl_uString_newFromAscii
rtl_uString_release
reg3
reg_openRegistry
reg_openRootKey
reg_openKey
reg_dumpRegistry
reg_closeKey
reg_closeRegistry
msvcr90
_controlfp_s
_invoke_watson
_except_handler4_common
__CxxFrameHandler3
exit
fprintf
__iob_func
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBDH@Z
?what@exception@std@@UBEPBDXZ
??3@YAXPAX@Z
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
strncmp
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
__initenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 658B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�DUH�ui Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE