C:\dev\out\win7-64bit\win64\Krypton\bem\client\windows\ashreporter\BemReporter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b7f8f294801ca191fdab70476ade9e90N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7f8f294801ca191fdab70476ade9e90N.exe
Resource
win10v2004-20240802-en
General
-
Target
b7f8f294801ca191fdab70476ade9e90N.exe
-
Size
1.8MB
-
MD5
b7f8f294801ca191fdab70476ade9e90
-
SHA1
5077f8a80f1ffa0ea98f290240bd801b7abab9f4
-
SHA256
32b18b269a321cab542a1dda9f64d284f6f24a0994cca0f7a34ef86fb30c4834
-
SHA512
259eef838e20d114994e85d2430953ba7c90ea9c51d719b04c50b60883730565d5f608e58ac520fbf6c30545c35ff313f38d148f8d44d79c561774bad7008740
-
SSDEEP
24576:4uPClRLOHMUYV2ZRMgH2u8yZCLTbUF+9HoA4/W39xCT6GmLDy1cLdXxqwyou:tAOHMUYngH26ZC/bUyL9xC8X8wy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7f8f294801ca191fdab70476ade9e90N.exe
Files
-
b7f8f294801ca191fdab70476ade9e90N.exe.exe windows:6 windows x64 arch:x64
ca7d4a8e9a7c9d458ad0667a9dffa586
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wininet
HttpSendRequestW
HttpSendRequestExW
HttpEndRequestW
HttpAddRequestHeadersW
InternetSetStatusCallbackW
HttpQueryInfoW
InternetOpenW
InternetCloseHandle
InternetConnectW
InternetReadFile
InternetWriteFile
HttpOpenRequestW
userenv
GetUserProfileDirectoryW
GetAllUsersProfileDirectoryW
advapi32
RegQueryValueExW
InitializeSecurityDescriptor
RegGetValueW
OpenProcessToken
CopySid
GetLengthSid
IsValidSid
IsWellKnownSid
ConvertSidToStringSidW
LookupAccountSidW
SetSecurityDescriptorDacl
RegCloseKey
RegCreateKeyExW
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegQueryInfoKeyW
ole32
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoUninitialize
shell32
SHGetFolderPathW
CommandLineToArgvW
user32
CharUpperW
MessageBoxW
kernel32
VerSetConditionMask
VerifyVersionInfoW
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
GetFileSizeEx
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
DecodePointer
GetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
CreateFileW
CloseHandle
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
ExpandEnvironmentStringsW
CompareFileTime
FindFirstFileW
FindNextFileW
GetFileSize
ReadFile
WriteFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
CreateEventW
GetComputerNameExW
GetModuleHandleW
LocalFree
FormatMessageW
QueryFullProcessImageNameW
K32EnumProcessModulesEx
K32GetModuleBaseNameW
GetVolumePathNameW
GetCurrentProcess
GetSystemDirectoryW
IsWow64Process
SetDllDirectoryW
GetModuleHandleA
FormatMessageA
MultiByteToWideChar
GetFileAttributesW
FreeLibrary
GetProcAddress
LoadLibraryW
InitializeCriticalSection
GetSystemTimeAsFileTime
GetACP
GetThreadLocale
CreateFileA
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetTimeZoneInformation
DeleteFileW
SetFilePointer
OutputDebugStringA
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
GetTickCount
GetModuleFileNameW
GetModuleHandleExW
GetFullPathNameW
LCMapStringW
GetCurrentDirectoryW
CreateDirectoryW
GetFileAttributesExW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
CopyFileW
MoveFileExW
GetCommandLineW
GetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
FreeLibraryAndExitThread
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WideCharToMultiByte
IsDebuggerPresent
RtlCaptureStackBackTrace
FlushFileBuffers
SetEndOfFile
SetFilePointerEx
FindFirstFileExW
RaiseException
Sleep
CreateThread
GetWindowsDirectoryW
GetVersionExW
GetNativeSystemInfo
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetCommandLineA
ExitProcess
GetFileType
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwindEx
RtlPcToFileHeader
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForMultipleObjectsEx
RtlUnwind
ExitThread
FindClose
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetCPInfo
CompareStringEx
LCMapStringEx
EncodePointer
GetStringTypeW
OutputDebugStringW
oleaut32
SysFreeString
SysAllocString
SysAllocStringByteLen
VariantClear
SysStringLen
shlwapi
PathMatchSpecW
SHCreateStreamOnFileW
SHCreateStreamOnFileEx
ws2_32
socket
sendto
htons
htonl
WSAStartup
winmm
timeGetTime
dbghelp
SymFromAddr
SymSetSearchPathW
SymGetSearchPathW
SymSetOptions
SymGetLineFromAddr64
SymInitialize
xmllite
CreateXmlReader
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 581KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ