J:\work\trunk_en_5.0\simulator\bin\ld.pdb
Static task
static1
Behavioral task
behavioral1
Sample
53f410a40e9d66627af058228aea03c952e14269dbe0bab4e16acfb237f2780c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
53f410a40e9d66627af058228aea03c952e14269dbe0bab4e16acfb237f2780c.exe
Resource
win10v2004-20240802-en
General
-
Target
53f410a40e9d66627af058228aea03c952e14269dbe0bab4e16acfb237f2780c
-
Size
17KB
-
MD5
b53a2bfa5817a6f32eed750b7b2c1a28
-
SHA1
d38f5c3937be75524ae07c78a9f267824d0437e9
-
SHA256
53f410a40e9d66627af058228aea03c952e14269dbe0bab4e16acfb237f2780c
-
SHA512
dd50b47d25468015fc2384b43a527f40be3d370dc56719598bc9386d042c9e7cd57e0569ceb278ecd740c5198b8d7bdd488b0079e40dc89edb0be3e935fb4235
-
SSDEEP
384:SlPCJldutUG+TGi3sBhws0IztLxPnwtb9RRrtdSqq7:SlQlf9r+hws0IJLertdSqO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53f410a40e9d66627af058228aea03c952e14269dbe0bab4e16acfb237f2780c
Files
-
53f410a40e9d66627af058228aea03c952e14269dbe0bab4e16acfb237f2780c.exe windows:5 windows x86 arch:x86
e07a42dc1b986a9506ff87c18fd088e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
GetModuleHandleW
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
CloseHandle
EncodePointer
DecodePointer
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
user32
DestroyWindow
GetMessageW
PostQuitMessage
LoadCursorW
TranslateMessage
RegisterClassExW
IsWindow
FindWindowExW
CreateWindowExW
SendMessageW
DefWindowProcW
DispatchMessageW
msvcp120
?_Syserror_map@std@@YAPBDH@Z
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Winerror_map@std@@YAPBDH@Z
msvcr120
_controlfp_s
memcpy
__CxxFrameHandler3
_CxxThrowException
_invoke_watson
_wcsicmp
memmove
wcstoul
_wtoi
__iob_func
wprintf
fgetws
_beginthreadex
printf
??_V@YAXPAX@Z
_snwprintf_s
_purecall
??3@YAXPAX@Z
setlocale
??2@YAPAXI@Z
_lock
_unlock
_calloc_crt
__dllonexit
_onexit
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
??1type_info@@UAE@XZ
_XcptFilter
_amsg_exit
__wgetmainargs
__set_app_type
exit
_exit
_cexit
_configthreadlocale
__setusermatherr
_initterm_e
_initterm
__winitenv
_fmode
_commode
_except_handler4_common
?terminate@@YAXXZ
__crtSetUnhandledExceptionFilter
memset
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ