proquota.pdb
Static task
static1
Behavioral task
behavioral1
Sample
001849fea493565bbe7f4d68381fc880N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
001849fea493565bbe7f4d68381fc880N.exe
Resource
win10v2004-20240802-en
General
-
Target
001849fea493565bbe7f4d68381fc880N.exe
-
Size
75KB
-
MD5
001849fea493565bbe7f4d68381fc880
-
SHA1
293babf920dbee7a869fa77ca3ef6a66c757884e
-
SHA256
8742735da819807dea706cc732a1eadd1edfd184cdc3ea762e9877133ffcda6a
-
SHA512
236526baef7f87188b0e9b79994042e6f73bb74fae34efe04ce3085096c1c1e5fb05e1aea4113f93c9f95c4bde11cf16212e473acd6ac446a4439cecf29cd51c
-
SSDEEP
1536:W36hfZJxrl3Z3mSmMtlc8bXOyM1Fk/zS19RC+P1tS9BQIWW3:YC7xF91mMt+IOyM1Fk/zKiO1g9BrWW3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 001849fea493565bbe7f4d68381fc880N.exe
Files
-
001849fea493565bbe7f4d68381fc880N.exe.exe windows:5 windows x86 arch:x86
76421f84ba0108de00fe5a7b24c9257b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
ord60
Shell_NotifyIconW
comctl32
ord17
advapi32
GetAce
RegNotifyChangeKeyValue
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
SetSecurityInfo
GetSecurityInfo
kernel32
FlushFileBuffers
GetEnvironmentStrings
GetSystemInfo
LocalFree
GetCurrentProcess
lstrcpyW
ExpandEnvironmentStringsW
LocalReAlloc
LocalAlloc
lstrlenW
FindNextFileW
CompareStringW
FindClose
lstrcmpiW
GetLastError
FindFirstFileW
SetLastError
LeaveCriticalSection
EnterCriticalSection
ExitThread
GetEnvironmentVariableW
SetEvent
FindCloseChangeNotification
Sleep
WaitForMultipleObjects
FindNextChangeNotification
CloseHandle
CreateEventW
FindFirstChangeNotificationW
ResumeThread
SetThreadPriority
CreateThread
WaitForSingleObject
InitializeCriticalSection
SetProcessShutdownParameters
OpenEventW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
VirtualProtect
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
GetLocaleInfoA
user32
LoadStringW
SendMessageW
SetWindowPos
GetDesktopWindow
GetParent
GetSystemMetrics
GetWindowLongW
GetWindowRect
SetForegroundWindow
CheckDlgButton
GetClientRect
EndDialog
PostMessageW
GetDlgItem
IsDlgButtonChecked
SendDlgItemMessageW
SetDlgItemTextW
KillTimer
SetTimer
LoadImageW
DialogBoxParamW
MessageBoxW
DefWindowProcW
LoadIconW
PostQuitMessage
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
RegisterClassW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE