f:\prj\SecurStick\SecurStick.pdb
Static task
static1
Behavioral task
behavioral1
Sample
SecurStick-x64.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SecurStick-x64.exe
Resource
win10v2004-20240802-en
General
-
Target
SecurStick-x64.exe
-
Size
766KB
-
MD5
6088165a3489ce092635b4783c3e16eb
-
SHA1
0be2335926d0c409dbdfa6e018cad501c0e6c6c1
-
SHA256
c5829b1ccdec88981e5d05da9a406e750511afae4485039710228a005aa2cd05
-
SHA512
8fe821330d0b2174b49f117a2911b66a0770581ab0767639b150cdc264a351ea8233929f7d7ca66d3b58e69b51fcb928fe8345a5e7193129901511e9cfc54f6a
-
SSDEEP
12288:d4F2LA6EIEQ778OfBrZn8AZCCMQuCZkzPJ4bU:o2LTEIEQ777fBrZTZPZw6Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecurStick-x64.exe
Files
-
SecurStick-x64.exe.exe windows:4 windows x64 arch:x64
cee43bdeb2ff8950ec72eb0906e094d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
kernel32
GetLastError
WriteFile
GetStdHandle
CreateFileA
ExitProcess
GetCurrentProcess
IsBadReadPtr
MapViewOfFile
CreateFileMappingA
OpenProcess
GetVersion
GetSystemInfo
Sleep
GetSystemDefaultLangID
GetUserDefaultLangID
GetConsoleScreenBufferInfo
SetConsoleWindowInfo
SetConsoleScreenBufferSize
GetLargestConsoleWindowSize
GetEnvironmentStrings
GetStartupInfoA
GetCommandLineA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
HeapAlloc
GetProcessHeap
HeapFree
HeapSize
SetConsoleCtrlHandler
SetConsoleTitleA
GetConsoleTitleA
ReadConsoleInputA
PeekConsoleInputA
SystemTimeToFileTime
GetSystemTime
GetLocalTime
GetTimeZoneInformation
WaitForSingleObject
LocalFileTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFileTime
SetFileTime
SetFilePointer
SetLastError
GetFileSize
SetEndOfFile
GetExitCodeProcess
ResumeThread
CreateProcessA
FreeEnvironmentStringsA
GetDriveTypeA
GetVolumeInformationA
GetSystemDirectoryA
GetWindowsDirectoryA
FindClose
GetFullPathNameA
GetFileAttributesA
SetFileAttributesA
DeviceIoControl
FindFirstFileA
DeleteFileA
CreateDirectoryA
RemoveDirectoryA
CopyFileA
GetTempPathA
GetTempFileNameA
MoveFileA
MulDiv
CreateEventA
CreateSemaphoreA
ReleaseSemaphore
GetCurrentThreadId
TerminateThread
SetPriorityClass
CreateThread
ExpandEnvironmentStringsA
FindNextFileA
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentProcessId
SetEvent
CloseHandle
UnmapViewOfFile
OutputDebugStringA
GetModuleFileNameA
Beep
GetTickCount
GetEnvironmentVariableA
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
__C_specific_handler
ReadFile
DebugBreak
user32
EndDialog
GetWindowLongPtrA
DialogBoxIndirectParamA
SetWindowPos
GetWindowPlacement
FindWindowA
wsprintfA
ShowWindow
SetCursor
LoadCursorA
DestroyWindow
SetTimer
KillTimer
CreateDialogIndirectParamA
GetDC
ReleaseDC
CreateWindowExA
SendMessageA
SetWindowLongA
SetFocus
SystemParametersInfoA
GetDesktopWindow
GetWindow
GetClassNameA
GetWindowThreadProcessId
MoveWindow
GetSystemMetrics
MessageBoxA
SetWindowLongPtrA
gdi32
SelectObject
CreateFontIndirectA
GetStockObject
GetTextExtentPointA
GetDeviceCaps
DeleteObject
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 545KB - Virtual size: 544KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ