Defrag.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8380b587835a1ad3dd767d614864d6965443cb69e76315acfa1532f33dc33d9a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8380b587835a1ad3dd767d614864d6965443cb69e76315acfa1532f33dc33d9a.exe
Resource
win10v2004-20240802-en
General
-
Target
8380b587835a1ad3dd767d614864d6965443cb69e76315acfa1532f33dc33d9a
-
Size
24KB
-
MD5
1431b00ffeb20f1c586df88d97c8b4c4
-
SHA1
74dcadd882418b772310b6fba6719df94ff16b5a
-
SHA256
8380b587835a1ad3dd767d614864d6965443cb69e76315acfa1532f33dc33d9a
-
SHA512
d8c772da0f0947c63fb57740005a7f6811428e66551e473372f31f7a23d2c53cfa6ad6234d25c46fab2b3ebc32b919f649a21709a70466c9187daf46cfa0c702
-
SSDEEP
384:wLnqaQ0T6ogFkhiqiyvVZhthldS6JQUE6wbeAEtdux2E2WkCf/MdrIS09fohVWfy:wjqaQWz5r9JKucEtD8kJ+h9AhX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8380b587835a1ad3dd767d614864d6965443cb69e76315acfa1532f33dc33d9a
Files
-
8380b587835a1ad3dd767d614864d6965443cb69e76315acfa1532f33dc33d9a.exe windows:5 windows x86 arch:x86
ea4d8c58d4b55bab57e39137f8905bb5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
__winitenv
exit
_cexit
_XcptFilter
_exit
_c_exit
wcsncat
wcsrchr
swscanf
localeconv
swprintf
atoi
wcscmp
wcscpy
wcscat
setlocale
malloc
free
wcslen
??2@YAPAXI@Z
??3@YAXPAX@Z
wcsncpy
_except_handler3
advapi32
InitializeSecurityDescriptor
SetEntriesInAclW
SetSecurityDescriptorDacl
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
GetSecurityDescriptorDacl
kernel32
SetErrorMode
LocalFree
LoadLibraryW
ExpandEnvironmentStringsW
GetDateFormatW
GetTimeFormatW
GetCurrentThreadId
lstrcatW
GetVolumeInformationW
CreateFileW
GetFileSize
GetVolumeNameForVolumeMountPointW
OpenProcess
GetCurrentProcess
DuplicateHandle
FreeLibrary
CreateEventW
DeviceIoControl
GetDriveTypeW
DeleteFileW
GetTempFileNameW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ReleaseMutex
WriteFile
GetLastError
GlobalLock
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalSize
GlobalAlloc
InterlockedIncrement
InterlockedDecrement
lstrlenW
lstrcpynW
lstrcpyW
SetThreadUILanguage
WideCharToMultiByte
GetConsoleOutputCP
WriteConsoleW
GetConsoleMode
GetFileType
GetStdHandle
FormatMessageW
SetEvent
WaitForSingleObject
CreateSemaphoreW
CloseHandle
ReleaseSemaphore
WaitForMultipleObjects
SetConsoleCtrlHandler
ResetEvent
ntdll
NtQueryVolumeInformationFile
user32
wsprintfW
LoadStringW
ole32
CoRegisterClassObject
CoInitializeEx
CoUninitialize
ReleaseStgMedium
CoTaskMemFree
StringFromCLSID
CoCreateGuid
CoCreateInstanceEx
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE