resourcecompiler.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a12f0212e00e494661b90942c7841cb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a12f0212e00e494661b90942c7841cb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a12f0212e00e494661b90942c7841cb0N.exe
-
Size
5.4MB
-
MD5
a12f0212e00e494661b90942c7841cb0
-
SHA1
28cb6d6f9e52c081cce7a8e3bb400438862a4d1f
-
SHA256
5e37502dd85e6cc103447adf5efad1369a057eafe77fc7e57051d78aa262c69d
-
SHA512
bda8eb68d3cc9c0a05706ec24ff4e90be745b35b9f0b0add07587f7d3fa05043686f24136f32bbd3993bca80de05bb84b336ee39e2d06af72ed86becc7855ead
-
SSDEEP
98304:F9hBiGrZSz4MER2Lm27uh6o7k7AFp7lb:F9hBicZSz4MER2Lm27HAFp7lb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a12f0212e00e494661b90942c7841cb0N.exe
Files
-
a12f0212e00e494661b90942c7841cb0N.exe.exe windows:6 windows x86 arch:x86
cc62650e22e4e9cbff4681e776cf4814
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FlsGetValue
FlsSetValue
FlsFree
QueryPerformanceFrequency
LoadLibraryExA
VirtualProtect
UnregisterWaitEx
FormatMessageW
GetProcessAffinityMask
FlsAlloc
RegisterWaitForSingleObject
SetThreadGroupAffinity
GetThreadGroupAffinity
GetNumaHighestNodeNumber
VirtualFree
WriteFile
ReadFile
CancelSynchronousIo
Sleep
LocalFree
GetLogicalProcessorInformationEx
GetCurrentProcessorNumberEx
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
QueryDepthSList
InterlockedPopEntrySList
ReleaseSemaphore
SetEvent
DuplicateHandle
GetModuleHandleA
GetSystemInfo
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetModuleHandleW
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
WaitForSingleObject
CreateProcessW
OutputDebugStringA
SetUnhandledExceptionFilter
CloseHandle
GetCurrentProcessId
VerSetConditionMask
VerifyVersionInfoW
GetCurrentThreadId
CreateFileW
LoadLibraryExW
VirtualQuery
GetLongPathNameW
GetModuleFileNameW
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
FormatMessageA
GetLocaleInfoEx
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
GetFullPathNameW
SetFileInformationByHandle
AreFileApisANSI
GetLastError
DeviceIoControl
CopyFileW
GetFileInformationByHandleEx
CreateSymbolicLinkW
GetStringTypeW
WaitForSingleObjectEx
SwitchToThread
GetExitCodeThread
GetNativeSystemInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
RaiseException
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LCMapStringEx
CompareStringEx
GetCPInfo
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStdHandle
GetFileType
GetModuleHandleExW
WriteConsoleW
GetDriveTypeW
ExitProcess
GetCommandLineA
GetCommandLineW
GetTimeZoneInformation
CreateThread
ExitThread
FreeLibraryAndExitThread
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SetEnvironmentVariableW
GetCurrentThread
HeapFree
OutputDebugStringW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapAlloc
SetFilePointerEx
GetFileSizeEx
ReadConsoleW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
GetExitCodeProcess
DeleteFileW
HeapSize
SetEndOfFile
GetThreadTimes
user32
MessageBoxW
SendMessageW
PostMessageW
wsprintfW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
advapi32
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExA
RegSetValueExW
RegCloseKey
assimp-vc143-mt32
??2AllocateFromAssimpHeap@Intern@Assimp@@SAPAXI@Z
aiGetMaterialTexture
aiGetMaterialFloatArray
aiGetMaterialString
aiGetMaterialColor
?FreeScene@Importer@Assimp@@QAEXXZ
?ReadFile@Importer@Assimp@@QAEPBUaiScene@@PBDI@Z
?SetIOHandler@Importer@Assimp@@QAEXPAVIOSystem@2@@Z
?SetPropertyInteger@Importer@Assimp@@QAE_NPBDH@Z
??1Importer@Assimp@@QAE@XZ
??0Importer@Assimp@@QAE@XZ
??3AllocateFromAssimpHeap@Intern@Assimp@@SAXPAX@Z
?ComparePaths@IOSystem@Assimp@@UBE_NPBD0@Z
freeimage32
_FreeImage_GetWidth@4
_FreeImage_SetPixelColor@16
_FreeImage_FIFSupportsExportBPP@8
_FreeImage_Rescale@16
_FreeImage_GetScanLine@8
_FreeImage_GetPixelColor@16
_FreeImage_ConvertTo32Bits@4
_FreeImage_CloseMemory@4
_FreeImage_SaveToMemory@16
_FreeImage_FlipVertical@4
_FreeImage_ConvertToStandardType@8
_FreeImage_LoadFromMemory@12
_FreeImage_SeekMemory@12
_FreeImage_Unload@4
_FreeImage_GetHeight@4
_FreeImage_GetBits@4
_FreeImage_ReadMemory@16
_FreeImage_TellMemory@4
_FreeImage_GetFileTypeU@8
_FreeImage_OpenMemory@8
_FreeImage_GetBPP@4
_FreeImage_Allocate@24
_FreeImage_LoadU@12
Sections
.text Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 304KB - Virtual size: 113.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 688KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE