E:\987.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4e5d53a02a807c0bd2b352bcf2dec940N.exe
Resource
win7-20240704-en
General
-
Target
4e5d53a02a807c0bd2b352bcf2dec940N.exe
-
Size
1.6MB
-
MD5
4e5d53a02a807c0bd2b352bcf2dec940
-
SHA1
a8789f41bb810aa004204d8a90a1ce32cbebe40f
-
SHA256
6de1cae2f9590f381861014394672c24bf8499d0d42c580def787b11ec1555aa
-
SHA512
0e89434f48f2d40efdd421a01fa9a310bd015b4d8b391f6eb2bc388f4238c38960d24f916530363f2d942186c8df6c748e01612b3e8a8cff9d2065619ff56dd3
-
SSDEEP
24576:pblVZt91gtMkubWLbvUpYUvkHaMLpfMA0jV6UwCCksDdQ76Uj:p9mspBaeAYLsDdAl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e5d53a02a807c0bd2b352bcf2dec940N.exe
Files
-
4e5d53a02a807c0bd2b352bcf2dec940N.exe.exe windows:5 windows x86 arch:x86
1df22d6cb054acccb7bd2bd69ef15e01
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
_TrackMouseEvent
ord17
ws2_32
setsockopt
closesocket
gethostbyname
WSAStartup
WSACleanup
WSAGetLastError
__WSAFDIsSet
select
WSASetLastError
bind
getpeername
getsockname
getsockopt
ntohs
accept
listen
recvfrom
sendto
ioctlsocket
gethostname
htonl
ntohl
send
socket
connect
recv
htons
kernel32
CreateFileW
SystemTimeToFileTime
CreateDirectoryA
GetSystemTime
GetFileTime
GetTempPathW
GetFileAttributesW
SetFileAttributesW
CreateEventW
MultiByteToWideChar
GetSystemDirectoryA
DeleteFileA
GetTickCount
ResumeThread
TerminateThread
SetLastError
GetModuleFileNameW
GlobalAlloc
GlobalLock
FreeLibrary
InterlockedIncrement
lstrcmpiW
GlobalUnlock
LoadLibraryExW
LoadLibraryA
GetLocalTime
GetFileAttributesA
SetFileAttributesA
FreeResource
GetVersionExA
WriteProcessMemory
VirtualProtect
VirtualAllocEx
CreateRemoteThread
OpenProcess
GetModuleHandleA
VirtualFree
InterlockedCompareExchange
VirtualAlloc
SuspendThread
GetThreadContext
FlushInstructionCache
SetThreadContext
VirtualQuery
WriteFile
ReadFile
SetFilePointer
SetFileTime
GetCurrentDirectoryW
CreateDirectoryW
WideCharToMultiByte
lstrlenW
GlobalSize
GlobalFree
GetFileSize
OutputDebugStringW
LocalAlloc
LocalReAlloc
LocalLock
LocalUnlock
LocalSize
LocalFree
lstrcpynW
lstrcpyW
CreateThread
ResetEvent
SetProcessWorkingSetSize
GetTempFileNameW
DeleteFileW
GetExitCodeThread
Process32First
TerminateProcess
Process32NextW
Process32Next
GetProcAddress
GetVersionExW
GetSystemInfo
GetSystemDirectoryW
WaitForMultipleObjects
CopyFileW
WritePrivateProfileStringA
SetEndOfFile
LoadLibraryW
SleepEx
VerSetConditionMask
VerifyVersionInfoA
FormatMessageA
GetFileType
GetStdHandle
PeekNamedPipe
ExpandEnvironmentStringsA
InterlockedExchange
SwitchToThread
DeviceIoControl
SetThreadAffinityMask
GetCurrentThread
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
GetFullPathNameW
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
ExitProcess
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
SetFilePointerEx
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
Process32FirstW
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapFree
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
InitializeCriticalSection
HeapSize
GetLastError
HeapReAlloc
RaiseException
HeapAlloc
WaitForSingleObject
MapViewOfFile
CreateFileMappingW
GetCurrentProcessId
CloseHandle
CreateFileA
GetTempPathA
UnmapViewOfFile
GetCurrentThreadId
CreateMutexW
GetCurrentProcess
FindResourceW
LoadResource
FindResourceExW
LockResource
Sleep
SizeofResource
InterlockedDecrement
FindClose
FindNextFileW
FindFirstFileW
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateEventA
GetModuleHandleW
SetEvent
GetPrivateProfileSectionNamesA
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
FileTimeToSystemTime
user32
IsZoomed
GetPropW
DrawTextW
EqualRect
IsRectEmpty
OffsetRect
MapWindowPoints
GetActiveWindow
SetClassLongW
GetClassLongW
IntersectRect
SetCaretPos
ShowCaret
HideCaret
DestroyCaret
GetCaretBlinkTime
CreateCaret
GetCursorPos
SetCursor
RemovePropW
SetPropW
GetCapture
UpdateLayeredWindow
wsprintfW
CopyRect
SetRectEmpty
FlashWindowEx
LoadImageW
OpenClipboard
CloseClipboard
SetClipboardData
GetClipboardData
EmptyClipboard
CharUpperBuffW
CharLowerBuffW
GetKeyState
PtInRect
IsMenu
GetMenuStringW
GetMenuItemCount
EndMenu
GetIconInfo
DestroyCursor
UnregisterClassW
PostQuitMessage
KillTimer
SetWindowLongW
TranslateMessage
PeekMessageW
SetTimer
DispatchMessageW
RegisterClassExW
CreateWindowExW
DefWindowProcW
GetWindowLongW
EnumDisplaySettingsW
SetForegroundWindow
IsWindow
ShowWindow
SendMessageW
GetMessageW
UpdateWindow
LoadCursorW
CharNextA
MessageBoxW
TrackPopupMenu
GetSubMenu
DestroyMenu
GetSystemMenu
SetWindowTextA
EnableMenuItem
GetSystemMetrics
DialogBoxParamW
CallWindowProcW
GetFocus
LoadMenuW
SetWindowRgn
PostMessageW
GetDesktopWindow
EnableWindow
SetCursorPos
SystemParametersInfoW
PostThreadMessageW
GetClientRect
LoadIconW
ClientToScreen
SetWindowPos
GetWindowRect
GetWindowTextW
EndPaint
BeginPaint
ReleaseDC
InvalidateRect
ReleaseCapture
GetParent
GetDC
SetCapture
GetClassNameW
CharNextW
SetFocus
MoveWindow
GetSysColor
RedrawWindow
EndDialog
ScreenToClient
DestroyWindow
FillRect
gdi32
GetCurrentObject
GetViewportOrgEx
SetBkColor
SetBkMode
SetTextColor
GetTextExtentPoint32W
GetTextExtentPointW
GetTextMetricsW
TextOutW
EnumFontsW
CreatePatternBrush
PatBlt
CombineRgn
GetBkColor
GetBkMode
GetTextColor
SetRectRgn
CreateFontW
CreateRoundRectRgn
ExtCreateRegion
GetRegionData
SetViewportOrgEx
CreateDIBSection
SelectClipRgn
CreateRectRgn
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetStockObject
GetObjectW
DeleteObject
GetClipBox
CreateBitmap
DeleteDC
advapi32
RegDeleteKeyW
RegOpenKeyExW
RegOpenKeyExA
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegQueryInfoKeyW
RegQueryValueExW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegCloseKey
shell32
SHGetSpecialFolderLocation
ShellExecuteW
SHGetSpecialFolderPathW
SHGetPathFromIDListW
Shell_NotifyIconW
SHGetFolderPathA
ord165
SHBrowseForFolderW
ShellExecuteA
SHGetFolderPathW
SHGetSpecialFolderPathA
ole32
CoTaskMemFree
CoTaskMemAlloc
OleUninitialize
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoUninitialize
CoInitialize
CoTaskMemRealloc
StgCreateDocfile
OleCreate
CoCreateGuid
CoCreateInstance
OleInitialize
oleaut32
LoadTypeLi
VariantInit
SysAllocString
VariantChangeType
VarUI4FromStr
GetErrorInfo
SysFreeString
DispGetIDsOfNames
VariantClear
gdiplus
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipLoadImageFromStream
GdipFillRectangle
GdipDrawRectangle
GdipDrawLinesI
GdipSetPenDashStyle
GdipDeletePen
GdipCreatePen1
GdipFillPieI
GdipSetSmoothingMode
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateSolidFill
GdipDeleteBrush
GdipFree
GdipAlloc
GdiplusStartup
GdiplusShutdown
GdipGetPropertyItemSize
GdipGetPropertyItem
GdipCreateBitmapFromScan0
GdipCreateBitmapFromHBITMAP
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipDrawImageRectI
GdipImageSelectActiveFrame
GdipDisposeImage
msimg32
AlphaBlend
GradientFill
wldap32
ord30
ord200
ord301
ord143
ord46
ord211
ord60
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 247KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 25KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE