b:\source\source.IC\39058\Release_WDExe_207\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2d3d22bb08c2760271833be99f9496fde049660bbfbb102e4fa077647e9b79e7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2d3d22bb08c2760271833be99f9496fde049660bbfbb102e4fa077647e9b79e7.exe
Resource
win10v2004-20240802-en
General
-
Target
2d3d22bb08c2760271833be99f9496fde049660bbfbb102e4fa077647e9b79e7
-
Size
434KB
-
MD5
f65b22e3e97109645c4cf3fa6c277ee3
-
SHA1
49bca4087035c48075acbc187885e9f593df872a
-
SHA256
2d3d22bb08c2760271833be99f9496fde049660bbfbb102e4fa077647e9b79e7
-
SHA512
875fdae80b63c2adc6fcee0d644962803fd5988aaa822631345ade34210c70fe74eec0c0099c075aef9602155dfde97aaa0dd69174871287db6a0ecf25d6ebd6
-
SSDEEP
12288:WsRC0dvz0ejLi7EFgfuVylrfmJvT7dMxn:XRC0dvz0ejW7GYuVyYvT7dg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d3d22bb08c2760271833be99f9496fde049660bbfbb102e4fa077647e9b79e7
Files
-
2d3d22bb08c2760271833be99f9496fde049660bbfbb102e4fa077647e9b79e7.exe windows:4 windows x86 arch:x86
456f72f36c8a5f1070d494d83551e544
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_except_handler3
_onexit
__dllonexit
isdigit
_snprintf
strncpy
vsprintf
_mbclen
_mbsinc
memcmp
wcscpy
_ismbcspace
realloc
_mbctoupper
_mbspbrk
_mbsrchr
_makepath
_stati64
memmove
_mbsstr
wcscat
wcschr
_mbschr
memchr
_vsnprintf
rand
wcslen
_mbsnbcpy
_mbsnbicmp
sprintf
atoi
strcat
strcpy
_mbscmp
strncmp
_mbsicmp
memcpy
_stricmp
gmtime
time
strlen
free
malloc
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
kernel32
SetEvent
RaiseException
GetSystemDefaultLangID
CreateThread
TerminateThread
ResumeThread
CreateProcessA
InterlockedExchange
ReleaseSemaphore
CreateSemaphoreA
MultiByteToWideChar
CompareStringA
WritePrivateProfileStringA
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetDriveTypeA
GetFullPathNameA
FindNextFileA
SetFileAttributesA
GetFileAttributesA
FindClose
FindFirstFileA
CreateDirectoryA
CopyFileA
MoveFileA
DeleteFileA
CreateFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
LockFileEx
GetVersion
UnlockFile
LockFile
SetFilePointer
WriteFile
WideCharToMultiByte
GetVolumeInformationA
GetLogicalDriveStringsA
GetFileInformationByHandle
lstrlenA
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateMailslotA
ExpandEnvironmentStringsA
GetLocalTime
GetComputerNameA
GetProfileStringA
ReadFile
GetExitCodeProcess
GetMailslotInfo
Sleep
GetPrivateProfileStringA
GetPrivateProfileIntA
ExitProcess
GetCommandLineA
LocalFree
FormatMessageA
GetModuleFileNameA
GetLastError
CreateFileMappingA
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleA
GetProcAddress
CreateEventA
GetStartupInfoA
MulDiv
LoadLibraryA
GetCurrentProcessId
FreeLibrary
FindResourceA
LoadResource
LockResource
FreeResource
GetTempPathA
GetTempFileNameA
OpenFileMappingA
CreateMutexA
WaitForSingleObject
ReleaseMutex
Exports
Exports
CommandeComposante
DeclareProxy
GeneralParam
LibereMutex
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ