D:\Work\Will\FPG\Src\CPA\Pack\Setup\59wan_124.pdb
Static task
static1
Behavioral task
behavioral1
Sample
10b0dc6aa488d35d08f7f59238a6a27c8a9d641e4736c7a7618873a6a7d32ed5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10b0dc6aa488d35d08f7f59238a6a27c8a9d641e4736c7a7618873a6a7d32ed5.exe
Resource
win10v2004-20240802-en
General
-
Target
10b0dc6aa488d35d08f7f59238a6a27c8a9d641e4736c7a7618873a6a7d32ed5
-
Size
300KB
-
MD5
41d843d8eaac4f16f022ead059630b2f
-
SHA1
f207aae4cb5101a4c03e3728a0b20587694c6fac
-
SHA256
10b0dc6aa488d35d08f7f59238a6a27c8a9d641e4736c7a7618873a6a7d32ed5
-
SHA512
a218baea2ff4c3dd9ba864ab06ef7bac8ed6fe656d300155247a7fa38c18a7ae23c11ae854adc4d1975c97950dc79f90e925ec48c10fe6146c3af6737647c8d1
-
SSDEEP
6144:nvhsNSZXMoj/4VklhHWacAnWC29YIoSBurxFi44on:nG4ZjjLlh2ac4WC29YPgexU44on
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10b0dc6aa488d35d08f7f59238a6a27c8a9d641e4736c7a7618873a6a7d32ed5
Files
-
10b0dc6aa488d35d08f7f59238a6a27c8a9d641e4736c7a7618873a6a7d32ed5.exe windows:5 windows x86 arch:x86
f57c5181c1cb4aed2d09ff50f87896b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstFileW
FindClose
GetCommandLineW
GetTempPathW
FindResourceW
SizeofResource
LoadResource
LockResource
DeleteFileW
WaitForSingleObject
CloseHandle
Sleep
GetVersionExW
lstrcatW
lstrcmpW
SetPriorityClass
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
ExitProcess
GetProcessHeap
SetEndOfFile
HeapReAlloc
HeapSize
FlushFileBuffers
SetStdHandle
WriteConsoleW
CreateFileW
GetStringTypeW
LCMapStringW
SetFilePointer
Process32NextW
Process32FirstW
GetLastError
CreateToolhelp32Snapshot
GetModuleFileNameW
WideCharToMultiByte
SetThreadPriority
MultiByteToWideChar
GetTickCount
QueryPerformanceCounter
HeapCreate
GetFileType
SetHandleCount
GetSystemTimeAsFileTime
GetFileAttributesW
GetProcAddress
GetModuleHandleW
DecodePointer
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EncodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteFile
GetConsoleCP
GetConsoleMode
DeleteCriticalSection
LoadLibraryW
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
ReadFile
user32
MessageBoxW
advapi32
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyW
RegOpenKeyExW
RegEnumValueW
shell32
ShellExecuteW
SHChangeNotify
ShellExecuteExW
SHGetSpecialFolderPathW
CommandLineToArgvW
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ