c:\pl\output\vistammsc.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d8e2398ff69d602612835daec1438815e7b4f346ae976ce809f6068b2d27fda3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d8e2398ff69d602612835daec1438815e7b4f346ae976ce809f6068b2d27fda3.exe
Resource
win10v2004-20240802-en
General
-
Target
d8e2398ff69d602612835daec1438815e7b4f346ae976ce809f6068b2d27fda3
-
Size
275KB
-
MD5
ded05d86124af9ff5f753743f7192db8
-
SHA1
e99023c0717a97c4a96d846e1ef85e4015b08196
-
SHA256
d8e2398ff69d602612835daec1438815e7b4f346ae976ce809f6068b2d27fda3
-
SHA512
1cc9da25aed4ce2b7a64f805084002f5881afa34f1d0792ed1edc79ee4a1b3af96c766912622cc5e8a241503d70406d0f3d9f4b7d9bb2ca5c22aa5267952bfff
-
SSDEEP
3072:PusncFMpFDoepEwcFim62nKwc6gvzC8fmHG5xMmdzUY3wvpulnfbcHIFggyWQRaT:l6OHyim3nDpF8fjDYf4lnSChBaYX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d8e2398ff69d602612835daec1438815e7b4f346ae976ce809f6068b2d27fda3
Files
-
d8e2398ff69d602612835daec1438815e7b4f346ae976ce809f6068b2d27fda3.exe windows:6 windows x86 arch:x86
695017cea1cdfe72d9769950086221d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathW
kernel32
GetActiveProcessorCount
GetActiveProcessorGroupCount
CreateProcessW
GetStartupInfoW
GetWindowsDirectoryW
GetVersionExW
OutputDebugStringW
DeleteCriticalSection
DecodePointer
InitializeCriticalSectionEx
GetLogicalProcessorInformationEx
GetLastError
MultiByteToWideChar
GetSystemTimeAsFileTime
CreateFileW
CloseHandle
GetExitCodeProcess
GetFileAttributesW
WaitForSingleObject
GetModuleHandleW
ExitProcess
LoadLibraryW
FindResourceW
FindResourceExW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
FreeLibrary
GetUserDefaultUILanguage
DeleteFileW
GetFileSize
SetLastError
GetCurrentProcess
GetCurrentProcessId
GetModuleFileNameW
GetProcAddress
GlobalAlloc
GlobalUnlock
GlobalLock
LocalFree
HeapDestroy
ReadFile
GetNumaHighestNodeNumber
GetNumaNodeProcessorMask
LocalAlloc
LocalLock
LocalUnlock
MulDiv
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
Sleep
FindNextFileW
FlushFileBuffers
SetEndOfFile
WriteFile
SetEvent
CreateEventW
IsDebuggerPresent
RaiseException
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetCurrentThreadId
GetStringTypeW
LoadLibraryExW
QueryPerformanceCounter
EncodePointer
GetCPInfo
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetStdHandle
GetFileType
LCMapStringW
SetFilePointerEx
FindClose
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleOutputCP
GetConsoleMode
WriteConsoleW
GetSystemInfo
WideCharToMultiByte
user32
DestroyWindow
MoveWindow
SetWindowPos
CreateDialogIndirectParamW
GetDialogBaseUnits
GetActiveWindow
GetAsyncKeyState
SetTimer
KillTimer
GetSystemMetrics
GetSystemMenu
EnableMenuItem
DrawIcon
DrawTextW
SetForegroundWindow
BeginPaint
EndPaint
RedrawWindow
GetWindowRect
MessageBeep
GetSysColor
FillRect
SetRect
GetParent
GetClassNameW
GetLastActivePopup
PostQuitMessage
LoadIconW
DestroyIcon
IsDialogMessageW
WinHelpW
SystemParametersInfoW
DispatchMessageW
TranslateMessage
IsWindowEnabled
SetFocus
IsDlgButtonChecked
CheckDlgButton
GetClientRect
CreateWindowExW
SetWindowLongW
GetWindowLongW
GetWindowTextW
SetWindowTextW
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
IsWindow
WaitMessage
GetWindow
PeekMessageW
MessageBoxW
LoadStringW
ShowWindow
SendMessageW
DialogBoxParamW
GetDlgItem
SetDlgItemTextW
SetDlgItemInt
GetDlgItemTextW
EndDialog
EnableWindow
PostMessageW
GetDlgItemInt
comdlg32
GetSaveFileNameW
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegCreateKeyExW
oleaut32
VariantClear
comctl32
InitCommonControlsEx
gdi32
CreateDCW
CreateSolidBrush
DeleteDC
SetBkColor
SetTextColor
SelectObject
CreateFontIndirectW
DeleteObject
GetTextExtentPoint32W
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ