C:\Users\whykillaz\source\repos\cv\valotrigger\x64\Release\valotrigger.pdb
Static task
static1
Behavioral task
behavioral1
Sample
synapseware.exe
Resource
win10v2004-20240802-en
General
-
Target
synapseware.exe
-
Size
2.4MB
-
MD5
f591efe1da22f1af3b35e5a184a00025
-
SHA1
f98188c7e08f2dd89443fa604b05308013bc95fa
-
SHA256
89c8b073699ba684958872bd5d1e19ff3f4e3047ac633de56de04b67eb9478cc
-
SHA512
713e683c765db43f6729f3ec55c3f9d6053d4901d98bf0d15bd68d60e28ba9379bbf538351e353d871d2eb4b709527be1f6baf3cdc03be700347a41b0462b9ee
-
SSDEEP
49152:xGTtVfIZGHWDGFasAMewUMi+svVtR9xNUB4NjnNSJtrBNO7iReLOI:xGtV7+sAMewUMzsvVtRTNUO6J3g7Ke
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource synapseware.exe
Files
-
synapseware.exe.exe windows:6 windows x64 arch:x64
6df943a4404e5968640a62b2331a71d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SetEndOfFile
SetStdHandle
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapAlloc
HeapFree
FlushFileBuffers
GetTimeZoneInformation
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
WriteFile
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
HeapSize
WriteConsoleW
GetFileAttributesW
GetModuleHandleW
GetCurrentProcess
SetPriorityClass
QueryPerformanceCounter
SetFilePointerEx
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetEnvironmentVariableW
DeleteFileW
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwindEx
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
LCMapStringEx
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
RaiseException
RtlPcToFileHeader
TryAcquireSRWLockExclusive
SleepConditionVariableSRW
WakeAllConditionVariable
FreeLibrary
VerSetConditionMask
GetProcAddress
QueryPerformanceFrequency
LoadLibraryA
GetModuleHandleA
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
GlobalAlloc
ExitProcess
CloseHandle
GetLastError
Sleep
MultiByteToWideChar
GetModuleFileNameW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetTickCount
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
SetEvent
WaitForSingleObject
CreateEventW
GetSystemDirectoryW
LoadLibraryW
SleepEx
GetEnvironmentVariableA
SetLastError
FormatMessageW
MoveFileExW
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
GetCurrentProcessId
WaitForSingleObjectEx
VerifyVersionInfoW
CreateFileW
GetFileSizeEx
LocalFree
FormatMessageA
GetLocaleInfoEx
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
AreFileApisANSI
GetFileInformationByHandleEx
GetStringTypeW
GetCurrentThreadId
GetExitCodeThread
RtlUnwind
user32
GetCursorPos
GetClientRect
SetCursor
SetCapture
LoadCursorW
GetForegroundWindow
TrackMouseEvent
ClientToScreen
GetCapture
ScreenToClient
GetKeyState
UpdateWindow
PostQuitMessage
SetWindowsHookExW
TranslateMessage
SetLayeredWindowAttributes
UnhookWindowsHookEx
PeekMessageW
DispatchMessageW
ShowWindow
RegisterClassExW
UnregisterClassW
GetSystemMetrics
CallNextHookEx
CreateWindowExW
DestroyWindow
GetWindowRect
DefWindowProcW
GetMessageW
SetWindowLongPtrW
SendInput
GetAsyncKeyState
MessageBoxW
SetClipboardData
GetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
ReleaseCapture
SetCursorPos
advapi32
RegDeleteValueA
RegOpenKeyExA
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
d3d11
D3D11CreateDeviceAndSwapChain
D3D11CreateDevice
dxgi
CreateDXGIFactory1
imm32
ImmSetCandidateWindow
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
d3dcompiler_43
D3DCompile
dwmapi
DwmExtendFrameIntoClientArea
bcrypt
BCryptGenRandom
ws2_32
select
ioctlsocket
__WSAFDIsSet
htonl
gethostname
inet_pton
getsockopt
send
WSACloseEvent
WSACreateEvent
WSAEnumNetworkEvents
WSAEventSelect
WSAResetEvent
WSAWaitForMultipleEvents
closesocket
WSASetLastError
WSAGetLastError
ntohs
inet_ntop
WSAStartup
WSACleanup
htons
bind
connect
getpeername
getsockname
recv
setsockopt
socket
WSAIoctl
recvfrom
sendto
accept
listen
getaddrinfo
freeaddrinfo
crypt32
CertCloseStore
CertFreeCertificateChain
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryW
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringW
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertOpenStore
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 270KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 991KB - Virtual size: 1000KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ