cmdl32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8bfb313960eecc82221e14c1ed16e0b3404b1004a760fd8b0b9169157a306cf7.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8bfb313960eecc82221e14c1ed16e0b3404b1004a760fd8b0b9169157a306cf7.exe
Resource
win10v2004-20240802-en
General
-
Target
8bfb313960eecc82221e14c1ed16e0b3404b1004a760fd8b0b9169157a306cf7
-
Size
47KB
-
MD5
b76692ae6c585ad4dd66c95fefc0c372
-
SHA1
d3614c3505f692d4a07288e5f77014372ba69b11
-
SHA256
8bfb313960eecc82221e14c1ed16e0b3404b1004a760fd8b0b9169157a306cf7
-
SHA512
aa98cc0f11f67489dbc6097d8cf30195aeef0c22b66387ef792bf102090d39e574ba0782f092a997c81708e4782dfb073ccd67f0e4d9fa3dd7aef288614dfcb9
-
SSDEEP
768:IJta1zI6rNbWYLODpYtQete8ADvbOX5is426Jwpt4NMpfG+dvQIm:EtC3rNakte8CvJs4hJwINMpLQIm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bfb313960eecc82221e14c1ed16e0b3404b1004a760fd8b0b9169157a306cf7
Files
-
8bfb313960eecc82221e14c1ed16e0b3404b1004a760fd8b0b9169157a306cf7.exe windows:5 windows x86 arch:x86
4dc1690ce14b6632c51eefa1dd91229c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
kernel32
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
CreateDirectoryA
GetCurrentProcess
ReleaseMutex
GetPrivateProfileSectionA
GetModuleHandleA
CreateEventA
CreateThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
CreateMutexA
CloseHandle
SetEndOfFile
SetFilePointer
CreateFileA
SetLastError
lstrcpyA
GetLastError
ReadFile
WriteFile
GetTempFileNameA
GetTempPathA
lstrlenA
SetFileAttributesA
lstrcmpiA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrcatA
GetFileSize
lstrcpynA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcmpA
FindFirstFileA
WritePrivateProfileStringA
CopyFileA
FlushFileBuffers
Sleep
WaitForSingleObject
ConvertDefaultLocale
GetVersionExA
GetSystemInfo
GetPrivateProfileStringA
GetPrivateProfileIntA
SetCurrentDirectoryA
GetCommandLineA
FreeLibrary
GetProcAddress
LoadLibraryExA
SetEvent
GetTickCount
GetSystemTimeAsFileTime
user32
SetWindowTextA
CharNextA
DialogBoxParamA
GetWindowLongA
EnableMenuItem
SetWindowLongA
GetWindowRect
SystemParametersInfoA
GetSystemMetrics
MoveWindow
GetDlgItemTextA
SetDlgItemTextA
EndDialog
wsprintfA
PostMessageA
RegisterClassExA
SetFocus
RegisterWindowMessageA
GetClassInfoExA
SendDlgItemMessageA
ShowWindow
KillTimer
cmpbk32
PhoneBookMergeChanges
PhoneBookLoad
PhoneBookFreeFilter
PhoneBookParseInfoA
PhoneBookUnload
cmutil
CmMalloc
CmStrCpyAllocA
CmRealloc
CmStrchrA
CmCompareStringA
CmFmtMsgA
?Log@CmLogFile@@QAAXW4_CMLOG_ITEM@@ZZ
CmFree
CmLoadSmallIconA
CmLoadIconA
?Stop@CmLogFile@@QAEJXZ
?Start@CmLogFile@@QAEJH@Z
?SetParams@CmLogFile@@QAEJHKPBD@Z
?Init@CmLogFile@@QAEJPAUHINSTANCE__@@HPBD@Z
GetOSVersion
??0CmLogFile@@QAE@XZ
??1CmLogFile@@QAE@XZ
?DeInit@CmLogFile@@QAEJXZ
CmBuildFullPathFromRelativeA
CmStrrchrA
comctl32
ord17
rasapi32
RasEnumConnectionsA
wininet
InternetSetOptionA
InternetOpenUrlA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetOpenA
InternetConnectA
FtpFindFirstFileA
InternetFindNextFileA
InternetCloseHandle
FtpOpenFileA
InternetReadFile
InternetCrackUrlA
InternetQueryOptionA
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE