D:\WORK\BSD2\dropper\Release\DROPPER2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
79b9898d5c03b25a5f4930a5a696801509372e2d1496057e3f7c948e7cc019a9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
79b9898d5c03b25a5f4930a5a696801509372e2d1496057e3f7c948e7cc019a9.exe
Resource
win10v2004-20240802-en
General
-
Target
79b9898d5c03b25a5f4930a5a696801509372e2d1496057e3f7c948e7cc019a9
-
Size
2.0MB
-
MD5
0386372aee3def178fbb094214fea260
-
SHA1
25ab39dc517cf1742bbcabdb3644a405c3390ba0
-
SHA256
79b9898d5c03b25a5f4930a5a696801509372e2d1496057e3f7c948e7cc019a9
-
SHA512
1f6f5567429ea52075d91a6eb6e33fa2b86d10de6ae9d0ad7910ebea33eea660f418e048cdd5b1d5f49d366bd26d95d7510fc3ca23c139ed7859bea8c23c56c7
-
SSDEEP
49152:iYhVlG0tHL/hVt1+2DJpOSGRKP/hbJyw:iYltRVVH+2DJhYgh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79b9898d5c03b25a5f4930a5a696801509372e2d1496057e3f7c948e7cc019a9
Files
-
79b9898d5c03b25a5f4930a5a696801509372e2d1496057e3f7c948e7cc019a9.exe windows:6 windows x86 arch:x86
fcf05964f585bd4c971e654ece5696f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
MoveFileExA
WaitForSingleObjectEx
CompareFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoA
GetEnvironmentVariableW
GetConsoleMode
ReadConsoleA
ReadConsoleW
SetConsoleMode
GetModuleHandleW
SwitchToFiber
DeleteFiber
CreateFiber
GetCurrentProcessId
GlobalMemoryStatus
ConvertFiberToThread
ConvertThreadToFiber
GetSystemTime
SystemTimeToFileTime
FindFirstFileW
LoadLibraryW
LoadLibraryA
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
GetTickCount
GetVersionExW
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
GetProcAddress
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
QueryPerformanceFrequency
SleepEx
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
FormatMessageW
SetLastError
GetCurrentThreadId
FindClose
FindNextFileA
GetDriveTypeA
FindFirstFileA
SignalObjectAndWait
SetEvent
CreateTimerQueue
DecodePointer
WriteConsoleW
HeapSize
GetTimeZoneInformation
DeleteFileW
GetStringTypeW
VirtualAlloc
QueryPerformanceCounter
GetProcessHeap
SetEnvironmentVariableW
GetLogicalDrives
CloseHandle
WriteFile
GetLastError
WideCharToMultiByte
UnregisterWaitEx
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
SetEndOfFile
SetStdHandle
GetFileAttributesExW
FlushFileBuffers
GetFileSizeEx
HeapReAlloc
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapFree
HeapAlloc
GetConsoleCP
GetModuleFileNameW
ExitProcess
SetConsoleCtrlHandler
SetFilePointerEx
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
LoadLibraryExW
EncodePointer
InterlockedFlushSList
InterlockedPushEntrySList
RaiseException
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
TryEnterCriticalSection
DuplicateHandle
SwitchToThread
GetCurrentThread
InitializeCriticalSectionAndSpinCount
CreateEventW
user32
GetClientRect
TranslateMessage
PostMessageA
PostQuitMessage
UpdateWindow
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetWindowThreadProcessId
AttachThreadInput
GetForegroundWindow
DefWindowProcA
RegisterClassA
ShowWindow
GetSystemMetrics
LoadCursorA
DispatchMessageA
GetMessageA
InvalidateRect
GetMonitorInfoA
EnumDisplayMonitors
BringWindowToTop
CreateWindowExA
advapi32
CryptSignHashW
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptGenRandom
CryptEnumProvidersW
DeregisterEventSource
CryptDestroyHash
CryptCreateHash
shell32
ShellExecuteA
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
shlwapi
ord12
PathFindExtensionA
dwrite
DWriteCreateFactory
d2d1
ord1
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertOpenStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
ws2_32
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
WSAWaitForMultipleEvents
closesocket
WSAGetLastError
recv
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
socket
WSAIoctl
WSAStartup
WSACleanup
__WSAFDIsSet
select
accept
htonl
listen
getaddrinfo
freeaddrinfo
recvfrom
sendto
ioctlsocket
gethostname
getnameinfo
shutdown
bind
WSASetLastError
wldap32
ord211
ord60
ord50
ord46
ord217
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord301
ord79
ord30
ord200
ord143
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 410KB - Virtual size: 410KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ