C:\Users\user\Desktop\All in one\APM 08279+5255\Release\APM 08279+5255.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Pandemonium.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Pandemonium.exe
Resource
win10v2004-20240802-en
General
-
Target
Pandemonium.exe
-
Size
259KB
-
MD5
82193aa87e2d92b5cb88bb193d79dca5
-
SHA1
64212aa7beb5b5c6667cf5b511a04d6c058a2ccd
-
SHA256
ac3c4fa4eb9ff7b61149b929b9c6c2a01348de2263397fae48751dd1642d957b
-
SHA512
f5a063e73d42a1247087d5b2b7c0191712917d9d3508a0779b1d8a3254f7edb25c4e58f84f58998b2e7a4e7c65dafffdf45fdb7392b58c871d6da54fb83c19ac
-
SSDEEP
3072:5/bkDWUjcj/QIou+tleks5dvA4obwgfSpWAW9Bt7pBAg0FujorZ3MsKmHcHpzo:5/bzbY9uihAMb1apaAO2Z3MG+o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Pandemonium.exe
Files
-
Pandemonium.exe.exe windows:5 windows x86 arch:x86
9cf28781775e3ef8d243426e77e4d7d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
LoadLibraryW
CreateThread
GetProcAddress
ExitProcess
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
Sleep
CreateFileW
WriteFile
GetCurrentProcess
FindNextFileW
FindFirstFileW
GetProcessHeap
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RaiseException
RtlUnwind
GetLastError
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetACP
GetFileType
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetFileAttributesExW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
HeapSize
user32
GetWindowRect
SendMessageTimeoutW
SetWindowPos
MessageBoxW
EnumChildWindows
GetSystemMetrics
GetForegroundWindow
GetDesktopWindow
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
shell32
ShellExecuteW
Sections
.text Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 820B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ