D:\temp_build\hd_ver1028_b6_cfa8b72e\bin\Launch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f7a1682f9cfa1fa23dd565b423a62291a46e48134300f37b7c3ec600f1b16fa3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f7a1682f9cfa1fa23dd565b423a62291a46e48134300f37b7c3ec600f1b16fa3.exe
Resource
win10v2004-20240802-en
General
-
Target
f7a1682f9cfa1fa23dd565b423a62291a46e48134300f37b7c3ec600f1b16fa3
-
Size
8.2MB
-
MD5
ee1f7419bb5f69fc07f3e703e9b6050c
-
SHA1
31b50a0122f543f6acc2c4bbd4be2d9cef23914c
-
SHA256
f7a1682f9cfa1fa23dd565b423a62291a46e48134300f37b7c3ec600f1b16fa3
-
SHA512
8d1faa87f446b61e88cc2b3e912b7313e77c9ba0c92c466cffc8470056d3d3c092b0cf80a0ef8dadcc95bacbaea4449939f3c2459224a89cfa9ad1030d20f1fd
-
SSDEEP
196608:9SOM/K9FRuuSZXU+mDARWKzD8ZVeuE7+KjcRXTZubz:wOBrRuZUvuoVeX4RXN8z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7a1682f9cfa1fa23dd565b423a62291a46e48134300f37b7c3ec600f1b16fa3
Files
-
f7a1682f9cfa1fa23dd565b423a62291a46e48134300f37b7c3ec600f1b16fa3.exe windows:6 windows x64 arch:x64
a09dcfac1dc125db437cd4a2a82b1583
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
getnameinfo
winmm
PlaySoundW
crypt32
CertOpenStore
shlwapi
StrCpyNW
gdiplus
GdipGetPenStartCap
comctl32
_TrackMouseEvent
msimg32
AlphaBlend
imm32
ImmSetCompositionWindow
dwmapi
DwmSetWindowAttribute
kernel32
LoadLibraryExA
user32
GetMenuDefaultItem
gdi32
GetTextFaceW
comdlg32
GetSaveFileNameW
winspool.drv
ClosePrinter
advapi32
CryptAcquireContextA
shell32
SetCurrentProcessExplicitAppUserModelID
uxtheme
DrawThemeText
ole32
PropVariantClear
oleaut32
SysFreeString
uiautomationcore
UiaRaiseAutomationEvent
d2d1
ord1
dwrite
DWriteCreateFactory
dbghelp
SymCleanup
oleacc
CreateStdAccessibleObject
bcrypt
BCryptGenRandom
winhttp
WinHttpReceiveResponse
wldap32
ord133
Sections
.text Size: - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 978KB - Virtual size: 977KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ