D:\data\landun\workspace\p-3d7f88f5f52b43179dd219a5c6dd1b5c\src\bin\Release_Win32\biz_notify.pdb
Static task
static1
Behavioral task
behavioral1
Sample
036b1dffbfba3be286e4ad2ecc64accca9c8b714c8726fecc99df55d8eefeb7d.exe
Resource
win7-20240704-en
General
-
Target
036b1dffbfba3be286e4ad2ecc64accca9c8b714c8726fecc99df55d8eefeb7d
-
Size
379KB
-
MD5
497a5ae5b828bb921964ab9c6e5e6a80
-
SHA1
b8171973b46ca7e7b7bd1079a9c62b0858e86db0
-
SHA256
036b1dffbfba3be286e4ad2ecc64accca9c8b714c8726fecc99df55d8eefeb7d
-
SHA512
8d4d9fdeef3e08950a19d101c16d9263257502f6ea67aca69b17249f596757ac40f369f922cfcdad93e7f4b6c85022a50c10032e974e962f1ac2e94b29e28e86
-
SSDEEP
6144:PIIIIFB2Yrk4cA7aMAOyxWSFlSb7Eva/S7QGCD2c6MgZT:FB2YY7MogFEva/OCqcRgZT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 036b1dffbfba3be286e4ad2ecc64accca9c8b714c8726fecc99df55d8eefeb7d
Files
-
036b1dffbfba3be286e4ad2ecc64accca9c8b714c8726fecc99df55d8eefeb7d.exe windows:6 windows x86 arch:x86
f1379cddd13d5d35f269a568f356aa34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryW
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCommandLineW
OpenMutexW
LoadLibraryExW
WriteFile
CreateFileW
FormatMessageW
LocalFree
HeapFree
LocalAlloc
OutputDebugStringW
HeapAlloc
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
CreateMutexW
ReleaseMutex
QueryPerformanceCounter
GetSystemDirectoryW
InitializeCriticalSectionEx
EncodePointer
GetSystemTimeAsFileTime
GetStringTypeW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RaiseException
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
ExitProcess
GetStdHandle
GetFileType
HeapReAlloc
LCMapStringW
SetFilePointerEx
GetConsoleMode
IsValidCodePage
GetACP
GetOEMCP
FindFirstFileExW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
HeapSize
GetConsoleOutputCP
WriteConsoleW
GetEnvironmentVariableW
GetCurrentThreadId
FindClose
GetCurrentProcess
FindNextFileW
SetLastError
lstrcmpW
GetLastError
GetProcessId
GetModuleFileNameW
DecodePointer
CloseHandle
AcquireSRWLockExclusive
SetEvent
ReleaseSRWLockExclusive
CreateEventW
WaitForSingleObject
InitOnceExecuteOnce
user32
SendInput
AllowSetForegroundWindow
shell32
ShellExecuteExW
ole32
CoRevokeClassObject
CoReleaseServerProcess
CoAddRefServerProcess
CoRegisterClassObject
CoResumeClassObjects
CoInitializeEx
imm32
ImmDisableIME
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
api-ms-win-core-winrt-error-l1-1-0
RoOriginateError
shlwapi
PathRemoveFileSpecW
PathAppendW
advapi32
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
InitializeAcl
AddAccessAllowedAceEx
GetLengthSid
RegCloseKey
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 83KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE