I:\IA_CodeBase\native\Libraries\Win32\remove\Release\remove.pdb
Static task
static1
Behavioral task
behavioral1
Sample
105c0c36fc2afbc7944c2ef63588b7a0N.exe
Resource
win7-20240705-en
General
-
Target
105c0c36fc2afbc7944c2ef63588b7a0N.exe
-
Size
263KB
-
MD5
105c0c36fc2afbc7944c2ef63588b7a0
-
SHA1
4195f0d74dc6cdd45824ae718062621806c4ddc2
-
SHA256
d982e371ee66832821ec8134e0d2d7e0ec9cd96970bc50263e2d0d7139d4a68e
-
SHA512
2d7a1b9f77a2e4b91b2d2176c3e3961142b2d7e744233e1b53b3ee37af5e86340063add5a177ed8dc8891e5717abb3c3c9d7c1ae66e830596d79eeb32d89994a
-
SSDEEP
3072:J18/bprcI+SMU85aQyGOvXT3lGdEhmZZikA2maZec:YjprchbOfTsqk1510c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 105c0c36fc2afbc7944c2ef63588b7a0N.exe
Files
-
105c0c36fc2afbc7944c2ef63588b7a0N.exe.exe windows:5 windows x86 arch:x86
dc6bdb5533b1d9a83c812ad725632f38
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcessHeap
Sleep
GetVersionExW
TerminateProcess
GetProcAddress
CloseHandle
GetEnvironmentVariableW
WaitForSingleObject
GetTickCount
HeapFree
GetFileAttributesW
ReadFile
CreateFileW
lstrcmpW
MultiByteToWideChar
GetLastError
RemoveDirectoryW
DeleteFileW
CreateThread
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
GetCurrentProcess
HeapAlloc
lstrcpynW
LoadLibraryW
OutputDebugStringW
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
GetStringTypeW
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetCommandLineW
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCurrentThreadId
GetStdHandle
WriteFile
GetModuleFileNameW
LoadLibraryExW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointerEx
HeapReAlloc
user32
wsprintfW
ExitWindowsEx
GetKeyState
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 106KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE