ui32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
db0db1008ae770708c0c512518880b7b3d7696caa366157ca5359c86f19d7364.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db0db1008ae770708c0c512518880b7b3d7696caa366157ca5359c86f19d7364.exe
Resource
win10v2004-20240802-en
General
-
Target
db0db1008ae770708c0c512518880b7b3d7696caa366157ca5359c86f19d7364
-
Size
7.9MB
-
MD5
8b9557d61558c566f70894667f443627
-
SHA1
29a6bed3c29f35571e48c9462d4fea7ebfc56c81
-
SHA256
db0db1008ae770708c0c512518880b7b3d7696caa366157ca5359c86f19d7364
-
SHA512
ab1b8f76e88bfcd73eb8b3bbd05e716afa9ebcf5730a0f458b7075713a89fdfb2c8875a96724bb9a8e05739c53a8cb78e8c2f3ee5d34e09dbb1696358c741e72
-
SSDEEP
196608:Edf1eUm72nlf6XYUlZagWgO/euE+hO7j:gf12GkZY/3EcO7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db0db1008ae770708c0c512518880b7b3d7696caa366157ca5359c86f19d7364
Files
-
db0db1008ae770708c0c512518880b7b3d7696caa366157ca5359c86f19d7364.exe windows:6 windows x86 arch:x86
39bb311c8db33f18649b7f6da5949905
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeviceIoControl
CreateNamedPipeW
CancelSynchronousIo
PeekNamedPipe
ConnectNamedPipe
ReadFile
WriteFile
GetProcessId
FormatMessageW
RegisterWaitForSingleObject
UnregisterWaitEx
FatalAppExitA
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetSystemInfo
GetFileAttributesW
GetFileTime
GetVersionExW
UnmapViewOfFile
OpenFileMappingA
MapViewOfFile
SetPriorityClass
ResumeThread
MulDiv
GetCurrentDirectoryW
LoadLibraryExA
VirtualProtect
ExpandEnvironmentStringsW
lstrcmpW
GetModuleFileNameA
GetSystemDirectoryW
InterlockedIncrement
InterlockedDecrement
InterlockedExchangeAdd
InitializeCriticalSection
GetProcessAffinityMask
SetThreadGroupAffinity
GetThreadGroupAffinity
GetNumaHighestNodeNumber
GetLogicalProcessorInformationEx
GetCurrentProcessorNumberEx
GetThreadPriority
SetThreadPriority
TerminateProcess
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
GetModuleHandleA
GetThreadTimes
SetEndOfFile
GetTimeZoneInformation
DeleteFileW
HeapSize
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
GetFileSizeEx
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
TlsGetValue
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
OutputDebugStringW
HeapReAlloc
HeapFree
FindFirstChangeNotificationW
GetCurrentThread
SetEnvironmentVariableW
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FreeLibraryAndExitThread
ExitThread
CreateThread
WriteConsoleW
GetModuleHandleExW
GetFileType
GetStdHandle
RtlUnwind
InterlockedFlushSList
InterlockedPushEntrySList
GetCPInfo
CompareStringEx
CloseThreadpoolWait
SetThreadpoolWait
CreateThreadpoolWait
InitializeSListHead
GetSystemTimeAsFileTime
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
CreateProcessW
LocalAlloc
GetExitCodeProcess
FindCloseChangeNotification
SignalObjectAndWait
CloseThreadpoolTimer
WaitForThreadpoolTimerCallbacks
SetThreadpoolTimer
CreateThreadpoolTimer
FreeLibraryWhenCallbackReturns
GetTickCount64
FlushProcessWriteBuffers
CreateSemaphoreExW
CreateEventExW
LCMapStringEx
InitializeCriticalSectionEx
DecodePointer
EncodePointer
GetStringTypeW
GetNativeSystemInfo
GetExitCodeThread
SwitchToThread
WaitForSingleObjectEx
TryAcquireSRWLockExclusive
GetComputerNameW
GetLongPathNameW
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
GetLocalTime
CancelIoEx
VerifyVersionInfoW
VerSetConditionMask
SetLastError
GetQueuedCompletionStatus
SetWaitableTimer
CreateIoCompletionPort
PostQueuedCompletionStatus
SleepEx
SetEvent
QueueUserAPC
TerminateThread
WaitForMultipleObjects
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
WakeConditionVariable
InitializeConditionVariable
RaiseException
GetLocaleInfoEx
CreateSymbolicLinkW
GetFileInformationByHandleEx
CreateHardLinkW
CopyFileW
AreFileApisANSI
SetFileTime
SetFileInformationByHandle
GetFullPathNameW
GetFinalPathNameByHandleW
GetFileInformationByHandle
GetFileAttributesExW
FindNextFileW
FindFirstFileExW
FindFirstFileW
FindClose
CreateDirectoryW
SetCurrentDirectoryW
FindNextChangeNotification
GetThreadId
ExitProcess
SetUnhandledExceptionFilter
LoadLibraryExW
VirtualQuery
GetModuleFileNameW
FreeLibrary
LoadLibraryW
CreateFileW
GetCurrentThreadId
GetProcAddress
GetCurrentProcessId
QueryPerformanceCounter
QueryPerformanceFrequency
Process32NextW
QueryFullProcessImageNameW
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
GetSystemPowerStatus
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleHandleW
GetCurrentProcess
DeleteCriticalSection
CloseHandle
CreateEventW
GetLastError
IsWow64Process
GetVersion
VirtualFree
VirtualAlloc
TlsFree
HeapAlloc
TlsSetValue
TlsAlloc
LocalFree
FormatMessageA
Sleep
MultiByteToWideChar
FlushFileBuffers
WideCharToMultiByte
user32
GetCursorPos
EnumWindows
MonitorFromWindow
ShowWindow
SetWindowPos
IsZoomed
LoadCursorW
RegisterClassW
CreateWindowExW
SetLayeredWindowAttributes
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetWindow
BringWindowToTop
GetClientRect
FindWindowW
GetIconInfo
CopyImage
MapVirtualKeyW
SystemParametersInfoW
SendMessageW
MoveWindow
UpdateLayeredWindow
ValidateRect
InvalidateRect
GetParent
SendMessageTimeoutW
SetTimer
KillTimer
GetShellWindow
GetMonitorInfoW
DestroyWindow
IsWindow
wsprintfW
MessageBoxW
MonitorFromPoint
LoadIconW
PeekMessageW
TranslateMessage
DispatchMessageW
GetAsyncKeyState
DefWindowProcW
DestroyIcon
EnableWindow
SetWindowPlacement
GetWindowPlacement
SetProcessDefaultLayout
MessageBoxA
AdjustWindowRectEx
PostQuitMessage
PostThreadMessageW
ShowCursor
ScreenToClient
IsWindowVisible
FindWindowExW
GetWindowThreadProcessId
SetPropW
RegisterClassExW
AttachThreadInput
FillRect
GetDisplayConfigBufferSizes
QueryDisplayConfig
DisplayConfigGetDeviceInfo
BeginPaint
EndPaint
GetClassNameW
EnumChildWindows
UnhookWindowsHookEx
SetParent
SetWinEventHook
UnhookWinEvent
EnumDisplayDevicesW
EnumDisplayMonitors
EnumDisplaySettingsW
SetWindowLongW
ReleaseDC
GetDesktopWindow
GetDC
GetSystemMetrics
SetCursorPos
GetWindowRect
SetFocus
PostMessageW
GetWindowLongW
SetForegroundWindow
gdi32
GetDeviceCaps
StretchDIBits
CreateSolidBrush
SetDIBits
CreateDIBitmap
GetObjectW
GetStockObject
DeleteObject
DeleteDC
GetDIBits
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
shell32
SHCreateShellItemArrayFromIDLists
ExtractIconExW
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
SHGetPropertyStoreForWindow
SHGetKnownFolderPath
SHCreateItemFromParsingName
SHParseDisplayName
SetCurrentProcessExplicitAppUserModelID
ole32
CoCreateGuid
RevokeDragDrop
ReleaseStgMedium
RegisterDragDrop
OleUninitialize
OleInitialize
IIDFromString
CoTaskMemAlloc
CoUninitialize
PropVariantClear
CoInitializeEx
CoCreateInstance
StringFromIID
CoTaskMemFree
advapi32
QueryServiceConfigW
RegQueryValueExW
RegCloseKey
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExA
RegGetValueW
RegCreateKeyExW
RegDeleteValueW
OpenSCManagerW
OpenServiceW
RegGetValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
DeleteService
CreateServiceW
RegOpenKeyExW
CloseServiceHandle
QueryServiceStatus
ControlService
StartServiceW
ws2_32
bind
getsockname
inet_ntop
htons
ntohs
htonl
ntohl
WSAStringToAddressW
WSAAddressToStringW
WSASocketW
WSASetLastError
setsockopt
WSAStartup
WSACleanup
WSAGetLastError
closesocket
ioctlsocket
select
listen
WSARecv
WSASend
WSASendTo
mswsock
AcceptEx
GetAcceptExSockaddrs
gdiplus
GdipSetTextRenderingHint
GdipSetSmoothingMode
GdipAlloc
GdipFillRectangle
GdipDrawString
GdipMeasureString
GdipDrawImageRectI
GdipDeleteGraphics
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipCloneImage
GdipCreateBitmapFromScan0
GdiplusStartup
GdiplusShutdown
GdipFree
GdipCreateFromHDC
GdipDeletePen
GdipCreatePen1
GdipDisposeImage
GdipCreateSolidFill
GdipCreateFontFamilyFromName
GdipDeleteBrush
GdipDrawRectangleI
comctl32
ord412
ord410
ord413
dwmapi
DwmDefWindowProc
DwmSetWindowAttribute
winmm
timeEndPeriod
timeBeginPeriod
d3d11
D3D11CreateDevice
powrprof
GetPwrCapabilities
shlwapi
StrStrIA
ord219
dxgi
CreateDXGIFactory1
libcef
cef_string_utf16_clear
cef_string_utf8_to_utf16
cef_run_message_loop
cef_string_utf16_cmp
cef_string_utf16_set
cef_string_utf16_to_utf8
cef_string_userfree_utf16_free
cef_string_list_alloc
cef_string_list_free
cef_currently_on
cef_post_task
cef_post_delayed_task
cef_clear_scheme_handler_factories
cef_execute_process
cef_initialize
cef_shutdown
cef_string_utf8_clear
cef_quit_message_loop
cef_api_hash
cef_log
cef_v8value_create_bool
cef_v8value_create_string
cef_v8value_create_object
cef_v8value_create_function
cef_process_message_create
cef_v8context_get_current_context
cef_browser_host_create_browser
cef_string_map_alloc
cef_string_map_free
cef_string_list_size
cef_string_list_value
cef_string_list_append
cef_string_map_size
cef_string_map_key
cef_string_map_value
cef_string_map_append
cef_string_multimap_size
cef_string_multimap_key
cef_string_multimap_value
cef_string_multimap_append
cef_string_multimap_alloc
cef_string_multimap_free
assimp-vc143-mt32
??1Importer@Assimp@@QAE@XZ
?SetPropertyInteger@Importer@Assimp@@QAE_NPBDH@Z
?SetIOHandler@Importer@Assimp@@QAEXPAVIOSystem@2@@Z
?ReadFile@Importer@Assimp@@QAEPBUaiScene@@PBDI@Z
?FreeScene@Importer@Assimp@@QAEXXZ
aiGetMaterialColor
aiGetMaterialString
aiGetMaterialFloatArray
?ComparePaths@IOSystem@Assimp@@UBE_NPBD0@Z
??0Importer@Assimp@@QAE@XZ
??3AllocateFromAssimpHeap@Intern@Assimp@@SAXPAX@Z
??2AllocateFromAssimpHeap@Intern@Assimp@@SAPAXI@Z
freeimage32
_FreeImage_GetBits@4
_FreeImage_GetHeight@4
_FreeImage_Unload@4
_FreeImage_SeekMemory@12
_FreeImage_ConvertTo24Bits@4
_FreeImage_UnlockPage@12
_FreeImage_LoadU@12
_FreeImage_SaveU@16
_FreeImage_FlipVertical@4
_FreeImage_LoadMultiBitmapFromMemory@12
_FreeImage_CloseMemory@4
_FreeImage_ConvertTo32Bits@4
_FreeImage_GetPixelColor@16
_FreeImage_LockPage@8
_FreeImage_GetScanLine@8
_FreeImage_GetPageCount@4
_FreeImage_Rescale@16
_FreeImage_CloseMultiBitmap@8
_FreeImage_SetPixelColor@16
_FreeImage_GetWidth@4
_FreeImage_TellMemory@4
_FreeImage_SaveToMemory@16
_FreeImage_ConvertToStandardType@8
_FreeImage_GetFileTypeU@8
_FreeImage_OpenMemory@8
_FreeImage_GetBPP@4
_FreeImage_Allocate@24
_FreeImage_ReadMemory@16
Exports
Exports
NoHotPatch
Sections
.text Size: 6.6MB - Virtual size: 6.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1003KB - Virtual size: 1003KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 218KB - Virtual size: 217KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ