D:\WORK\BSD2\dropper\Release\DROPPER2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e64d38bf9377dddbd486c4c1d9f8b7b2d47c95e6c6bb767f6d7200eecf78133b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e64d38bf9377dddbd486c4c1d9f8b7b2d47c95e6c6bb767f6d7200eecf78133b.exe
Resource
win10v2004-20240802-en
General
-
Target
e64d38bf9377dddbd486c4c1d9f8b7b2d47c95e6c6bb767f6d7200eecf78133b
-
Size
2.0MB
-
MD5
8adefdaef106abf82f489120adc7a155
-
SHA1
87167f6ba4fa2ed808cd2bd116a1066530a2b4eb
-
SHA256
e64d38bf9377dddbd486c4c1d9f8b7b2d47c95e6c6bb767f6d7200eecf78133b
-
SHA512
21c7a36861dcbfeb831f34b047abf0903b90785a0868c915f0b4b12dafa09eedec53bbc8b7883ef2b5d90de88184db040df305e3b4c0820f06b66a3e5b801957
-
SSDEEP
49152:3YhVlG0tHL/hVt1+2DJpOSGRKP/hhJyw:3YltRVVH+2DJhYgh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e64d38bf9377dddbd486c4c1d9f8b7b2d47c95e6c6bb767f6d7200eecf78133b
Files
-
e64d38bf9377dddbd486c4c1d9f8b7b2d47c95e6c6bb767f6d7200eecf78133b.exe windows:6 windows x86 arch:x86
fcf05964f585bd4c971e654ece5696f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
MoveFileExA
WaitForSingleObjectEx
CompareFileTime
GetSystemTimeAsFileTime
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
VerSetConditionMask
VerifyVersionInfoA
GetEnvironmentVariableW
GetConsoleMode
ReadConsoleA
ReadConsoleW
SetConsoleMode
GetModuleHandleW
SwitchToFiber
DeleteFiber
CreateFiber
GetCurrentProcessId
GlobalMemoryStatus
ConvertFiberToThread
ConvertThreadToFiber
GetSystemTime
SystemTimeToFileTime
FindFirstFileW
LoadLibraryW
LoadLibraryA
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
GetTickCount
GetVersionExW
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
GetProcAddress
GetModuleHandleA
FreeLibrary
GetSystemDirectoryA
QueryPerformanceFrequency
SleepEx
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
FormatMessageW
SetLastError
GetCurrentThreadId
FindClose
FindNextFileA
GetDriveTypeA
FindFirstFileA
SignalObjectAndWait
SetEvent
CreateTimerQueue
DecodePointer
WriteConsoleW
HeapSize
GetTimeZoneInformation
DeleteFileW
GetStringTypeW
VirtualAlloc
QueryPerformanceCounter
GetProcessHeap
SetEnvironmentVariableW
GetLogicalDrives
CloseHandle
WriteFile
GetLastError
WideCharToMultiByte
UnregisterWaitEx
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetFullPathNameW
GetCurrentDirectoryW
SetEndOfFile
SetStdHandle
GetFileAttributesExW
FlushFileBuffers
GetFileSizeEx
HeapReAlloc
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapFree
HeapAlloc
GetConsoleCP
GetModuleFileNameW
ExitProcess
SetConsoleCtrlHandler
SetFilePointerEx
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
LoadLibraryExW
EncodePointer
InterlockedFlushSList
InterlockedPushEntrySList
RaiseException
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
TryEnterCriticalSection
DuplicateHandle
SwitchToThread
GetCurrentThread
InitializeCriticalSectionAndSpinCount
CreateEventW
user32
GetClientRect
TranslateMessage
PostMessageA
PostQuitMessage
UpdateWindow
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
GetWindowThreadProcessId
AttachThreadInput
GetForegroundWindow
DefWindowProcA
RegisterClassA
ShowWindow
GetSystemMetrics
LoadCursorA
DispatchMessageA
GetMessageA
InvalidateRect
GetMonitorInfoA
EnumDisplayMonitors
BringWindowToTop
CreateWindowExA
advapi32
CryptSignHashW
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptGenRandom
CryptEnumProvidersW
DeregisterEventSource
CryptDestroyHash
CryptCreateHash
shell32
ShellExecuteA
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
shlwapi
ord12
PathFindExtensionA
dwrite
DWriteCreateFactory
d2d1
ord1
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertOpenStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
ws2_32
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
WSAWaitForMultipleEvents
closesocket
WSAGetLastError
recv
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
socket
WSAIoctl
WSAStartup
WSACleanup
__WSAFDIsSet
select
accept
htonl
listen
getaddrinfo
freeaddrinfo
recvfrom
sendto
ioctlsocket
gethostname
getnameinfo
shutdown
bind
WSASetLastError
wldap32
ord211
ord60
ord50
ord46
ord217
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord301
ord79
ord30
ord200
ord143
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 410KB - Virtual size: 410KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ