d:\jenkins\workspace\ThunderPC\ThunderCpp_AP_Build_Pack_Thunder\thunder11_cppsrc\thunder\build\ProductRelease\ThunderStart.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0417c9a82cb9c893ec109f6c40ec8f718fce2ba7f88358c8fda8e895c20578a3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0417c9a82cb9c893ec109f6c40ec8f718fce2ba7f88358c8fda8e895c20578a3.exe
Resource
win10v2004-20240802-en
General
-
Target
0417c9a82cb9c893ec109f6c40ec8f718fce2ba7f88358c8fda8e895c20578a3
-
Size
1.8MB
-
MD5
3624f9d91e71ea8136fcafbbb7518ef9
-
SHA1
4e6962aefe64b33a3f32d40d625e31bf9edf344f
-
SHA256
0417c9a82cb9c893ec109f6c40ec8f718fce2ba7f88358c8fda8e895c20578a3
-
SHA512
a5b3b1e43e962ca4e9a21eba77112e72c55ab4bb9bed7d2490976fc47ad606bb4f2e78628cb6944d46d046cce01fe093c2c28ba5e6f50e33c47ebc62460a662d
-
SSDEEP
49152:OOZ0yvcF6nNEfn22cie2nVXdx14rD18LDPL/cah:OOZ0yvcF6nyTcieCVNn4rD18Xj/ca
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0417c9a82cb9c893ec109f6c40ec8f718fce2ba7f88358c8fda8e895c20578a3
Files
-
0417c9a82cb9c893ec109f6c40ec8f718fce2ba7f88358c8fda8e895c20578a3.exe windows:6 windows x86 arch:x86
110ccb1ba17ad0ed0f86c6c5ce87af91
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
SizeofResource
FindResourceW
LoadLibraryW
lstrcmpiW
GetPrivateProfileStringW
MultiByteToWideChar
CloseHandle
ReleaseMutex
WaitForSingleObject
CreateMutexW
GetSystemTime
FindResourceExW
LockResource
SystemTimeToTzSpecificLocalTime
OpenFileMappingW
MapViewOfFileEx
UnmapViewOfFile
LocalFree
lstrcpyW
lstrlenW
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
OpenMutexW
WaitForMultipleObjects
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
GetProcessId
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32EnumProcessModules
K32GetModuleFileNameExW
SetPriorityClass
WriteConsoleW
CreateFileW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
WriteFile
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetLastError
GetTempPathW
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
GetPrivateProfileStringA
CreateDirectoryA
ResetEvent
SetEvent
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
WritePrivateProfileStringA
lstrcpyA
GetFileAttributesA
SetStdHandle
DecodePointer
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
InitializeCriticalSectionAndSpinCount
EncodePointer
WideCharToMultiByte
GetVersionExA
CreateFileA
GetVolumeInformationA
lstrcatA
DeviceIoControl
user32
SetWindowPos
SetTimer
UpdateWindow
ShowWindow
PostThreadMessageW
PostMessageW
UnregisterClassW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
CharNextW
GetClientRect
GetWindowRect
MapWindowPoints
GetWindowLongW
GetDesktopWindow
GetParent
FindWindowW
GetWindow
MonitorFromWindow
DestroyWindow
GetMonitorInfoW
MessageBoxW
SendMessageTimeoutW
InvalidateRect
EndPaint
BeginPaint
KillTimer
IsWindowVisible
UpdateLayeredWindow
SendMessageW
LoadCursorW
SetWindowLongW
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
DefWindowProcW
gdi32
CreateCompatibleDC
DeleteDC
CreateDIBSection
SelectObject
DeleteObject
advapi32
RegEnumKeyExW
RegCreateKeyExW
TraceEvent
GetTraceEnableLevel
GetTraceLoggerHandle
UnregisterTraceGuids
RegisterTraceGuidsW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
shell32
ShellExecuteExW
CommandLineToArgvW
SHGetSpecialFolderPathA
ole32
OleInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
VarUI4FromStr
iphlpapi
GetAdaptersInfo
ws2_32
WSAStartup
shlwapi
PathAppendW
PathCombineW
PathFileExistsW
StrStrIW
StrStrW
PathFindFileNameW
gdiplus
GdipGetImageHeight
GdipDeleteGraphics
GdipDisposeImage
GdipCloneImage
GdipDrawImageRect
GdipGetImageWidth
GdipCreateFromHDC
GdipAlloc
GdipFree
GdiplusStartup
GdiplusShutdown
GdipLoadImageFromStream
Sections
.text Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ