ALG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b59cd288547fee047aed0ee61b88d2b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b59cd288547fee047aed0ee61b88d2b0N.exe
-
Size
658KB
-
MD5
b59cd288547fee047aed0ee61b88d2b0
-
SHA1
4378c7b165272b1cc7651acf5e1c10448d448406
-
SHA256
d94e8dab089c8c57efa2f7bf97d020d418d348e68f21704242022bf1f0fd47b2
-
SHA512
75fd54e5f960bb333248f5925979aa8bc57f0e746fce4fd48d40231323b57dbf9728ddef3fcaee86c96017351f3048d477b9673c162d938dcc7b0ae451da25a4
-
SSDEEP
12288:6r+IBLQAFtMa8MLBn/M5BiIymQEZ/faim4WbvFqsG+nM3dOrrH:6/LQCZHd/MHiIrQE3aQl9+Mcrr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b59cd288547fee047aed0ee61b88d2b0N.exe
Files
-
b59cd288547fee047aed0ee61b88d2b0N.exe.exe windows:10 windows x64 arch:x64
63879732bf2bfd01cf874c563a6cac5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcrt
_cexit
_amsg_exit
_exit
_onexit
__set_app_type
__dllonexit
_XcptFilter
_wcmdln
_CxxThrowException
_unlock
_lock
??1type_info@@UEAA@XZ
__wgetmainargs
exit
__CxxFrameHandler3
_initterm
?terminate@@YAXXZ
_commode
__setusermatherr
isdigit
_callnewh
??0exception@@QEAA@AEBQEBDH@Z
memmove
??0exception@@QEAA@XZ
memmove_s
memcpy_s
_wcsicmp
?what@exception@@UEBAPEBDXZ
realloc
wcscat_s
malloc
free
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
__C_specific_handler
_fmode
memcmp
memcpy
memset
api-ms-win-core-synch-l1-2-0
WaitForSingleObject
SetEvent
EnterCriticalSection
Sleep
LeaveCriticalSection
CreateEventW
InitializeCriticalSection
DeleteCriticalSection
api-ms-win-core-libraryloader-l1-2-0
LoadResource
GetModuleHandleW
LoadLibraryExW
GetProcAddress
SizeofResource
GetModuleFileNameW
FindResourceExW
FreeLibrary
api-ms-win-core-string-l2-1-0
CharPrevW
CharNextW
api-ms-win-core-errorhandling-l1-1-1
GetLastError
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-registry-l1-1-0
RegEnumKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegSetValueExW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteValueW
RegNotifyChangeKeyValue
api-ms-win-core-memory-l1-1-2
VirtualQuery
VirtualProtect
VirtualAlloc
api-ms-win-core-sysinfo-l1-2-1
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
api-ms-win-core-string-l1-1-0
MultiByteToWideChar
api-ms-win-core-handle-l1-1-0
DuplicateHandle
CloseHandle
api-ms-win-core-synch-l1-2-1
WaitForMultipleObjects
api-ms-win-core-heap-l1-2-0
HeapFree
HeapDestroy
HeapAlloc
GetProcessHeap
HeapSetInformation
api-ms-win-core-processthreads-l1-1-2
GetCurrentThreadId
GetStartupInfoW
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
CreateThread
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-rtlsupport-l1-2-0
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
api-ms-win-core-threadpool-legacy-l1-1-0
DeleteTimerQueueEx
DeleteTimerQueueTimer
CreateTimerQueue
CreateTimerQueueTimer
api-ms-win-core-string-obsolete-l1-1-0
lstrcpynW
lstrcmpiW
cryptbase
SystemFunction036
mswsock
AcceptEx
GetAcceptExSockaddrs
api-ms-win-core-file-l1-2-1
ReadFile
WriteFile
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
DelayLoadFailureHook
api-ms-win-core-kernel32-legacy-l1-1-1
BindIoCompletionCallback
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE