ALG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d872d3cc6d6186a767620b1312a889b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d872d3cc6d6186a767620b1312a889b0N.exe
-
Size
1.2MB
-
MD5
d872d3cc6d6186a767620b1312a889b0
-
SHA1
96dbeef122ceb73d9fd0f774af604b70c014de7f
-
SHA256
92df8e56128217b1879049bfb889951bb7a7026f42a72e1270e779e47b53c5ed
-
SHA512
92f6d50978a991b355226382d3fcb5eed45491c3811157903cc65b25ff7806ebb6d09c1a29553242d08eb4ee213fcf7101e2a6b69b5df64b6a12e908edaf9cff
-
SSDEEP
12288:Kr+IB5Q5MTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:K/5QiSkQ/7Gb8NLEbeZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d872d3cc6d6186a767620b1312a889b0N.exe
Files
-
d872d3cc6d6186a767620b1312a889b0N.exe.exe windows:10 windows x64 arch:x64
63879732bf2bfd01cf874c563a6cac5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcrt
_cexit
_amsg_exit
_exit
_onexit
__set_app_type
__dllonexit
_XcptFilter
_wcmdln
_CxxThrowException
_unlock
_lock
??1type_info@@UEAA@XZ
__wgetmainargs
exit
__CxxFrameHandler3
_initterm
?terminate@@YAXXZ
_commode
__setusermatherr
isdigit
_callnewh
??0exception@@QEAA@AEBQEBDH@Z
memmove
??0exception@@QEAA@XZ
memmove_s
memcpy_s
_wcsicmp
?what@exception@@UEBAPEBDXZ
realloc
wcscat_s
malloc
free
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
__C_specific_handler
_fmode
memcmp
memcpy
memset
api-ms-win-core-synch-l1-2-0
WaitForSingleObject
SetEvent
EnterCriticalSection
Sleep
LeaveCriticalSection
CreateEventW
InitializeCriticalSection
DeleteCriticalSection
api-ms-win-core-libraryloader-l1-2-0
LoadResource
GetModuleHandleW
LoadLibraryExW
GetProcAddress
SizeofResource
GetModuleFileNameW
FindResourceExW
FreeLibrary
api-ms-win-core-string-l2-1-0
CharPrevW
CharNextW
api-ms-win-core-errorhandling-l1-1-1
GetLastError
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-registry-l1-1-0
RegEnumKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegSetValueExW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteValueW
RegNotifyChangeKeyValue
api-ms-win-core-memory-l1-1-2
VirtualQuery
VirtualProtect
VirtualAlloc
api-ms-win-core-sysinfo-l1-2-1
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
api-ms-win-core-string-l1-1-0
MultiByteToWideChar
api-ms-win-core-handle-l1-1-0
DuplicateHandle
CloseHandle
api-ms-win-core-synch-l1-2-1
WaitForMultipleObjects
api-ms-win-core-heap-l1-2-0
HeapFree
HeapDestroy
HeapAlloc
GetProcessHeap
HeapSetInformation
api-ms-win-core-processthreads-l1-1-2
GetCurrentThreadId
GetStartupInfoW
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
CreateThread
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-rtlsupport-l1-2-0
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
api-ms-win-core-threadpool-legacy-l1-1-0
DeleteTimerQueueEx
DeleteTimerQueueTimer
CreateTimerQueue
CreateTimerQueueTimer
api-ms-win-core-string-obsolete-l1-1-0
lstrcpynW
lstrcmpiW
cryptbase
SystemFunction036
mswsock
AcceptEx
GetAcceptExSockaddrs
api-ms-win-core-file-l1-2-1
ReadFile
WriteFile
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
DelayLoadFailureHook
api-ms-win-core-kernel32-legacy-l1-1-1
BindIoCompletionCallback
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE