DfrgNtfs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
00c17df4992a611ae07f8565362aa16412d6c0c0044578e834c44cd3d53555f9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
00c17df4992a611ae07f8565362aa16412d6c0c0044578e834c44cd3d53555f9.exe
Resource
win10v2004-20240802-en
General
-
Target
00c17df4992a611ae07f8565362aa16412d6c0c0044578e834c44cd3d53555f9
-
Size
116KB
-
MD5
ad28355d8c6bdbffa7b530a9b0969a1a
-
SHA1
6e6e984885ae2c201ee9196dfe911257986f0668
-
SHA256
00c17df4992a611ae07f8565362aa16412d6c0c0044578e834c44cd3d53555f9
-
SHA512
9d2d0550fceaad567fb5255b968b1282275394b75567addfa6a10944cb4a975007a7fadd984c455c54b36fa0a89314eda3c03612a49cdce4064a59d2575c960c
-
SSDEEP
3072:uf1jM0M2P1h5jEiWBPCemkiV4lgevQqEAiZ:g6xEMVCemk/LQqED
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00c17df4992a611ae07f8565362aa16412d6c0c0044578e834c44cd3d53555f9
Files
-
00c17df4992a611ae07f8565362aa16412d6c0c0044578e834c44cd3d53555f9.exe windows:5 windows x86 arch:x86
b671321f63147a44e93a4098de6a9d9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
swscanf
iswctype
_wcsicmp
_fmode
_wfopen
fgetws
fclose
wcscmp
localeconv
atoi
_local_unwind2
_snwprintf
_snprintf
towupper
swprintf
wcsstr
wcscat
wcsrchr
wcschr
wcscspn
wcsncmp
wcsncat
wcscpy
memmove
??3@YAXPAX@Z
??2@YAPAXI@Z
wcslen
wcsncpy
_wtoi
_except_handler3
advapi32
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
SetEntriesInAclW
LookupPrivilegeValueW
OpenProcessToken
SetSecurityDescriptorDacl
FreeSid
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AdjustTokenPrivileges
kernel32
GetFileInformationByHandle
IsDebuggerPresent
OutputDebugStringA
GetLocalTime
FlushFileBuffers
LocalFree
SetErrorMode
DeviceIoControl
GlobalHandle
ExitThread
QueryPerformanceCounter
QueryPerformanceFrequency
GetComputerNameW
SetEvent
OpenEventW
GetCommandLineW
CreateThread
GetSystemPowerStatus
GetVersionExW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
SetFilePointer
GetCurrentProcess
GlobalLock
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalSize
GlobalAlloc
HeapFree
GetProcessHeap
HeapAlloc
SetLastError
ReadFile
WriteFile
InterlockedIncrement
InterlockedDecrement
Sleep
CloseHandle
GetLastError
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcpyW
GetFileSize
CreateFileW
ReleaseMutex
lstrcatW
FormatMessageW
GetCurrentThreadId
lstrlenW
GetTimeFormatW
GetDateFormatW
WaitForSingleObject
lstrcpynW
SizeofResource
FindResourceW
lstrcmpiW
CompareStringW
ExpandEnvironmentStringsW
GetSystemWindowsDirectoryW
lstrcmpW
SystemTimeToFileTime
GetVolumeNameForVolumeMountPointW
GetDriveTypeW
FindVolumeMountPointClose
FindNextVolumeMountPointW
FindFirstVolumeMountPointW
LoadLibraryW
GetVolumeInformationW
gdi32
GetStockObject
user32
LoadStringW
CharUpperW
wvsprintfA
SendMessageW
MessageBoxW
RegisterClassW
LoadCursorW
CreateWindowExW
SetTimer
KillTimer
PostQuitMessage
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
PostMessageW
wsprintfW
DefWindowProcW
ntdll
NtQueryVolumeInformationFile
RtlInitializeGenericTableAvl
NtQueryInformationFile
RtlIsGenericTableEmptyAvl
RtlEnumerateGenericTableLikeADirectory
RtlDeleteElementGenericTableAvl
RtlInsertElementGenericTableAvl
RtlEnumerateGenericTableAvl
NtFsControlFile
NtWaitForSingleObject
RtlNumberGenericTableElementsAvl
comctl32
ord17
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ole32
CoInitializeEx
CoUninitialize
CoCreateInstanceEx
CLSIDFromString
CoInitializeSecurity
ReleaseStgMedium
CoRegisterClassObject
vssapi
ord5
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE