net.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5430005e20f47c1929332da58af7c800N.exe
Resource
win7-20240704-en
General
-
Target
5430005e20f47c1929332da58af7c800N.exe
-
Size
72KB
-
MD5
5430005e20f47c1929332da58af7c800
-
SHA1
dafa2b36e58ad2c2f04dc4a5ecd4b15b4115b4e7
-
SHA256
b2e19d5ddbc81990a7f42d9df76cea4587d26d98f1ba86f2f15d2036a3930a39
-
SHA512
ea61ed40a200cd40160379095051a639fb3081a5ca91ecae2979457c10d414b973fd86fea23262cd4fdc0fc7c25da752307316c0be25dbf727408b535954c222
-
SSDEEP
1536:ByAXivhJyLHSXuyTBN2Hc6zpc5mYxeeTLOOWgglp:ADJSyeyT6HFOHwzp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5430005e20f47c1929332da58af7c800N.exe
Files
-
5430005e20f47c1929332da58af7c800N.exe.exe windows:6 windows x86 arch:x86
b1f584304d1c7f2899a954905d8318c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
kernel32
SetThreadUILanguage
GetCPInfo
GetConsoleOutputCP
GetLastError
HeapSetInformation
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessW
GetSystemDirectoryW
GetDriveTypeW
DelayLoadFailureHook
GetProcAddress
FreeLibrary
InterlockedCompareExchange
GetStdHandle
WriteFile
FormatMessageW
LocalFree
SetLastError
GetModuleFileNameW
PeekConsoleInputW
GetConsoleMode
SetConsoleMode
ReadConsoleW
GetFileType
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
Sleep
InterlockedExchange
GetCommandLineW
LoadLibraryExA
WriteConsoleW
LoadLibraryW
GetConsoleScreenBufferInfo
LocalAlloc
WideCharToMultiByte
msvcrt
_vsnwprintf_s
free
putchar
__setusermatherr
_amsg_exit
_initterm
__p__commode
_snwprintf_s
_local_unwind4
wcstok
_wcsdup
wcsncat_s
calloc
wcscspn
wcsspn
__set_app_type
__p__fmode
_except_handler4_common
?terminate@@YAXXZ
memmove
_XcptFilter
_exit
_cexit
__getmainargs
wcsrchr
wcsncpy_s
wcsncmp
qsort
_ultow
wcspbrk
iswctype
_wcsupr
_wcsicmp
wcschr
wcscpy_s
wcscat_s
exit
sprintf_s
setlocale
_wcsnicmp
memset
_iob
_fileno
_setmode
_controlfp
malloc
netutils
NetpwNameValidate
NetApiBufferReallocate
NetApiBufferAllocate
NetapipBufferAllocate
NetpwPathType
NetApiBufferFree
browcli
NetServerEnum
samcli
NetUserGetInfo
srvcli
NetShareEnum
NetServerGetInfo
wkscli
NetUseGetInfo
NetWkstaUserGetInfo
NetWkstaGetInfo
NetUseEnum
mpr
WNetEnumResourceW
WNetAddConnection2W
WNetCancelConnection2W
WNetGetLastErrorW
WNetGetConnectionW
WNetOpenEnumW
WNetCloseEnum
iphlpapi
GetCurrentThreadCompartmentId
ntdll
RtlAllocateHeap
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE