c:\Common\sand\Hundred\Ship\Whose\Observe\Sure\Force.pdb
Static task
static1
Behavioral task
behavioral1
Sample
47c502dc2afe3a9d96722da789906378455145b8856341e8ad32a25f4084570c.dll
Resource
win7-20240708-en
General
-
Target
47c502dc2afe3a9d96722da789906378455145b8856341e8ad32a25f4084570c
-
Size
188KB
-
MD5
fc6f359745827e8459f5ef6bb9f82d66
-
SHA1
2af243cd19fc1575ce7d8e23def9b04c79e9a649
-
SHA256
47c502dc2afe3a9d96722da789906378455145b8856341e8ad32a25f4084570c
-
SHA512
fbbf6166269bf8f3d132cfb5264c385a7c07abc4c1d93f079bfe5839a89d993e11b3eddfae85ec9ebe06cd8b09b2f72cbcfaa542a5ff8a6c0e935cc13514131a
-
SSDEEP
3072:AiyFFA003t401K/EKK0LKA7/D5N+gHPVcbW6GGix93yYDB:Ato3DAs0L1VXafix9P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 47c502dc2afe3a9d96722da789906378455145b8856341e8ad32a25f4084570c
Files
-
47c502dc2afe3a9d96722da789906378455145b8856341e8ad32a25f4084570c.dll windows:4 windows x86 arch:x86
9469d9ffd6c0e6624172e5e7db5595ea
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateFileA
QueryPerformanceCounter
GetWindowsDirectoryA
GetDateFormatA
OpenProcess
Sleep
SizeofResource
CreateProcessA
GetEnvironmentVariableA
RemoveDirectoryA
SetFileAttributesA
GetModuleHandleA
FindFirstChangeNotificationA
VirtualProtect
GetCurrentThreadId
GetVersionExA
GetSystemTime
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
CloseHandle
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetCPInfo
RaiseException
RtlUnwind
LCMapStringA
LCMapStringW
GetFileType
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetStdHandle
SetHandleCount
GetStdHandle
GetStartupInfoA
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
VirtualAlloc
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
HeapSize
GetACP
GetOEMCP
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetEndOfFile
ReadFile
LoadLibraryA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
Sections
.text Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ