ALG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
23f05a84439a70c0e64d90ee36f8fabf6bd2806c8b688c4f4baeca9e67ce1624.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
23f05a84439a70c0e64d90ee36f8fabf6bd2806c8b688c4f4baeca9e67ce1624.exe
Resource
win10v2004-20240802-en
General
-
Target
23f05a84439a70c0e64d90ee36f8fabf6bd2806c8b688c4f4baeca9e67ce1624
-
Size
44KB
-
MD5
75aef8c57bb8064c44d33ee5a4d4c2c6
-
SHA1
e96d51aee06acafe9fbf40f26856a43436a9340b
-
SHA256
23f05a84439a70c0e64d90ee36f8fabf6bd2806c8b688c4f4baeca9e67ce1624
-
SHA512
59c9731916bea086ff2d2863b3b16238cc90cb633985a38e830843bc56caa0aa81d6f6eec82cf82698d9fbf2ab3622632d4f6e1b12f43492ad7264126bbb110c
-
SSDEEP
768:2B8vv1DUIdprHC1bLVcdW8JROZTq5SH3:lHJdeEW4ROlISH3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23f05a84439a70c0e64d90ee36f8fabf6bd2806c8b688c4f4baeca9e67ce1624
Files
-
23f05a84439a70c0e64d90ee36f8fabf6bd2806c8b688c4f4baeca9e67ce1624.exe windows:5 windows x86 arch:x86
427e3befc80580ae1e6d27f0d91bd3aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__setusermatherr
_initterm
__wgetmainargs
__CxxFrameHandler
??2@YAPAXI@Z
memmove
isdigit
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
_wcsicmp
_purecall
_except_handler3
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
??3@YAXPAX@Z
atl
ord20
ord32
ord17
ord23
ord21
ord16
advapi32
RegEnumKeyExW
RegQueryValueExW
StartServiceCtrlDispatcherW
RegNotifyChangeKeyValue
RegisterServiceCtrlHandlerW
SetServiceStatus
RegOpenKeyExW
RegCloseKey
SystemFunction036
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
WaitForSingleObject
SetEvent
DeleteTimerQueueTimer
BindIoCompletionCallback
CreateThread
ReadFile
WriteFile
HeapAlloc
GetProcessHeap
HeapFree
CreateTimerQueueTimer
GetCurrentProcessId
DuplicateHandle
GetSystemTimeAsFileTime
GetLastError
CreateTimerQueue
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteTimerQueueEx
CloseHandle
Sleep
WaitForMultipleObjects
CreateEventW
GetCurrentProcess
ole32
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoUninitialize
CoInitializeEx
CLSIDFromString
oleaut32
SysAllocString
SysFreeString
wsock32
getsockname
ord1142
WSAStartup
setsockopt
WSACleanup
htons
listen
closesocket
ioctlsocket
WSAGetLastError
ntohs
htonl
ord1141
bind
getpeername
ws2_32
WSASocketW
WSAIoctl
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE