C:\Source\openoffice\main\registry\wntmsci12.pro\bin\regview.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f593020627e94f96d787e914b3a2db58c833daadde4e4bf625c103f9b23a84a2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f593020627e94f96d787e914b3a2db58c833daadde4e4bf625c103f9b23a84a2.exe
Resource
win10v2004-20240709-en
General
-
Target
f593020627e94f96d787e914b3a2db58c833daadde4e4bf625c103f9b23a84a2
-
Size
28KB
-
MD5
7d2671336042198974ef4c2cda06ed34
-
SHA1
494e807d7a011cc540e18228344e02e354c859ce
-
SHA256
f593020627e94f96d787e914b3a2db58c833daadde4e4bf625c103f9b23a84a2
-
SHA512
526095b1b7ccd9cdb6dff5620807eb7587b4a21d0a8a74ca420cf97ead0df6b3e19c1660950ec86ef387b86cc3a0863da3105c18a812b4df37f84042f497a991
-
SSDEEP
768:mbKaz6v+vOInzqItQGPL4vzZq2o9W7GsxBbPr:mbKyOGFaGCq2iW7z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f593020627e94f96d787e914b3a2db58c833daadde4e4bf625c103f9b23a84a2
Files
-
f593020627e94f96d787e914b3a2db58c833daadde4e4bf625c103f9b23a84a2.exe windows:5 windows x86 arch:x86
86caff84a2371c5e0dc504ee505264f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
sal3
osl_getThreadTextEncoding
osl_getProcessWorkingDir
osl_getFileURLFromSystemPath
osl_getAbsoluteFileURL
rtl_string2UString
rtl_uString_acquire
rtl_uString_new
rtl_uString_newFromAscii
rtl_uString_release
reg3
reg_openRegistry
reg_openRootKey
reg_openKey
reg_dumpRegistry
reg_closeKey
reg_closeRegistry
msvcr90
_controlfp_s
_invoke_watson
_except_handler4_common
__CxxFrameHandler3
exit
fprintf
__iob_func
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBDH@Z
?what@exception@std@@UBEPBDXZ
??3@YAXPAX@Z
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
strncmp
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
__initenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 992B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 658B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�DUH�ui Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE