launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d091c31755a7940b2ed1afdba67b144a62977ea968864cf51e6ce02eb667bd44.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d091c31755a7940b2ed1afdba67b144a62977ea968864cf51e6ce02eb667bd44.exe
Resource
win10v2004-20240802-en
General
-
Target
d091c31755a7940b2ed1afdba67b144a62977ea968864cf51e6ce02eb667bd44
-
Size
651KB
-
MD5
3d95b4fb5653b2ef46711c43fe3dd65f
-
SHA1
ccd933c039abdcaddfdbe9fb8e3a1b0eb33d65a7
-
SHA256
d091c31755a7940b2ed1afdba67b144a62977ea968864cf51e6ce02eb667bd44
-
SHA512
a787e48dcb993637b029384429eacf0817df2f995efe98a8e07df88ac3baac6ed9f96c67542ffc89711be37b6520d7285ea899ce26ee6d008a3f656f06d59a4b
-
SSDEEP
12288:pkYe1a67MgxW2u2YwBSwzqggFE8qBXR918lc9mllmk:pkYe97M6tYwB9zqgt8qBb1ac0l0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d091c31755a7940b2ed1afdba67b144a62977ea968864cf51e6ce02eb667bd44
Files
-
d091c31755a7940b2ed1afdba67b144a62977ea968864cf51e6ce02eb667bd44.exe windows:6 windows x86 arch:x86
f751fe9f94037e2b18e48ce35883084b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleW
LoadLibraryA
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
FatalAppExitA
LocalAlloc
ExpandEnvironmentStringsW
lstrcmpW
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryW
InterlockedIncrement
InterlockedDecrement
InterlockedExchangeAdd
InitializeCriticalSection
SetEndOfFile
HeapSize
GetTimeZoneInformation
SetStdHandle
OutputDebugStringW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetExitCodeProcess
GetACP
IsValidCodePage
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
GetFileSizeEx
ReadFile
SetFilePointerEx
HeapAlloc
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapFree
WriteConsoleW
CreateProcessW
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
SetUnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
GetCurrentThreadId
LoadLibraryExW
VirtualQuery
GetLongPathNameW
GetModuleFileNameW
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
TerminateProcess
Process32Next
GetCurrentProcessId
Process32First
FormatMessageW
LocalFree
GetLastError
GetFileType
WriteFile
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetDriveTypeW
TlsFree
TlsSetValue
TlsGetValue
CreateToolhelp32Snapshot
CreateFileW
TlsAlloc
Sleep
WaitForSingleObject
CloseHandle
OpenProcess
MultiByteToWideChar
GetOEMCP
WideCharToMultiByte
FormatMessageA
GetLocaleInfoEx
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
GetFullPathNameW
SetFileInformationByHandle
AreFileApisANSI
DeviceIoControl
CopyFileW
GetFileInformationByHandleEx
CreateSymbolicLinkW
GetStringTypeW
TryAcquireSRWLockExclusive
WaitForSingleObjectEx
GetExitCodeThread
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LCMapStringEx
CompareStringEx
GetCPInfo
RtlUnwind
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
user32
GetClassNameW
EnumWindows
GetWindowThreadProcessId
wsprintfW
IsWindow
FindWindowExW
FindWindowW
EndDialog
MessageBoxW
DestroyIcon
DispatchMessageW
TranslateMessage
IsDialogMessageW
GetMessageW
LoadImageW
MoveWindow
CreateDialogParamW
DefWindowProcW
LoadBitmapW
PostQuitMessage
ShowWindow
EnableWindow
GetWindowLongW
SetWindowTextW
SetWindowPos
GetSystemMetrics
SetWindowLongW
ScreenToClient
GetWindowRect
SendMessageW
GetClientRect
GetDlgItem
SetDlgItemTextW
DestroyWindow
CreateWindowExW
RegisterClassW
PostMessageW
shell32
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
advapi32
RegDeleteKeyW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExW
RegDeleteValueW
QueryServiceConfigW
RegDeleteKeyValueW
RegGetValueW
RegOpenKeyW
CloseServiceHandle
DeleteService
QueryServiceStatus
ControlService
OpenServiceW
OpenSCManagerW
d3d11
D3D11CreateDevice
comctl32
ord17
Exports
Exports
NoHotPatch
Sections
.text Size: 405KB - Virtual size: 405KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ