E:\WorksCenter\AptorBase\APTOR\SourceCodeZone\GENERAL_DLL\AnyLink\putty-src\putty-src\WINDOWS\MSVC\PLINK\Release\plink.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4292d88695ea06b5f456de1bf4b24ad2e2b7a06f20468ae423e9633cf59772cc.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4292d88695ea06b5f456de1bf4b24ad2e2b7a06f20468ae423e9633cf59772cc.exe
Resource
win10v2004-20240802-en
General
-
Target
4292d88695ea06b5f456de1bf4b24ad2e2b7a06f20468ae423e9633cf59772cc
-
Size
622KB
-
MD5
3477be05a77d0a3e787d081c0af88818
-
SHA1
6aac5f6145a2d42ef8b47fa1efb06b495526d583
-
SHA256
4292d88695ea06b5f456de1bf4b24ad2e2b7a06f20468ae423e9633cf59772cc
-
SHA512
74f0884a6366496bb1a6f97ce7b4be9ac0333883e8fece66cdb46962ad9e473afd37c1bc7add9ba9abc9999f5ce0fdcea003333b4805a51e8e636c1d8f29cdc7
-
SSDEEP
12288:PKWPsDj1EPfPaMSRj6de69AUx/gjdVCqG+XZl2HsjL:RPSCfgBZc/g7m6ZlDjL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4292d88695ea06b5f456de1bf4b24ad2e2b7a06f20468ae423e9633cf59772cc
Files
-
4292d88695ea06b5f456de1bf4b24ad2e2b7a06f20468ae423e9633cf59772cc.exe windows:6 windows x86 arch:x86
55ed537749749e10861e7d3f85d04f40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
CreateEventA
CreateThread
GetSystemDirectoryA
GetVersionExA
FormatMessageA
FindClose
FindFirstFileA
FindNextFileA
QueryPerformanceCounter
GetProcessTimes
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetThreadTimes
GetSystemTime
GetSystemTimeAdjustment
GetWindowsDirectoryA
GlobalMemoryStatus
GetCurrentThreadId
OpenProcess
MapViewOfFile
UnmapViewOfFile
LocalAlloc
LocalFree
CreateFileMappingA
SetEvent
GetModuleHandleA
LoadLibraryW
SetHandleInformation
CreatePipe
CreateProcessA
CreateFileA
ClearCommBreak
GetCommState
SetCommBreak
SetCommState
SetCommTimeouts
GetEnvironmentVariableA
DeleteFileA
GetLocalTime
CreateFileW
SetEnvironmentVariableA
HeapSize
OutputDebugStringW
GetTimeZoneInformation
WriteConsoleW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetOverlappedResult
GetLastError
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
GetTickCount
SetConsoleMode
GetConsoleMode
WriteFile
ReadFile
GetStdHandle
GetFileType
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetCommandLineA
DeleteCriticalSection
GetStartupInfoW
RtlUnwind
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
FatalAppExitA
FlushFileBuffers
GetConsoleCP
GetProcessHeap
GetModuleFileNameW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
ReadConsoleW
LoadLibraryExW
GetModuleFileNameA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
SetFilePointerEx
GetStringTypeW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
SetEndOfFile
user32
MsgWaitForMultipleObjects
PostThreadMessageA
PeekMessageA
FindWindowA
SendMessageA
GetCursorPos
GetForegroundWindow
GetCapture
GetQueueStatus
GetClipboardOwner
advapi32
RegCreateKeyA
RegSetValueExA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
GetLengthSid
CopySid
GetUserNameA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
Sections
.text Size: 514KB - Virtual size: 513KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ