F:\WORKSPACE\browser-home-locker\_build_\launcher.win32.release.pdb
Static task
static1
Behavioral task
behavioral1
Sample
143dd5ca254cdfbfd986ac0645cd6511b709669c638cfb07e18b3a1832c5289f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
143dd5ca254cdfbfd986ac0645cd6511b709669c638cfb07e18b3a1832c5289f.exe
Resource
win10v2004-20240802-en
General
-
Target
143dd5ca254cdfbfd986ac0645cd6511b709669c638cfb07e18b3a1832c5289f
-
Size
1.2MB
-
MD5
d931ff06bf85a3ad7dcef34eaa51ea61
-
SHA1
734d0aedeeea467a4aef562f3e41f74855877c42
-
SHA256
143dd5ca254cdfbfd986ac0645cd6511b709669c638cfb07e18b3a1832c5289f
-
SHA512
10680a6fc0168f1f0f08ccd1971f209e5bfd213cb643cabc7af7358ad1cf74e70f0c5b2a9f48145b2062d0055ba41b6323475aa3a8a0226c5fd74d8a16371276
-
SSDEEP
12288:f1U9UlCA5socxB30YezyFQqwHiSUe9HXSnwhNSFKSik2L:uCCA2hn0YyDCS593SwU7b2L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 143dd5ca254cdfbfd986ac0645cd6511b709669c638cfb07e18b3a1832c5289f
Files
-
143dd5ca254cdfbfd986ac0645cd6511b709669c638cfb07e18b3a1832c5289f.exe windows:5 windows x86 arch:x86
8219f93000e1ed7bd3c62beb8746e7f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileMappingA
CloseHandle
VirtualFreeEx
ReadProcessMemory
GetProcAddress
VirtualProtectEx
VirtualAllocEx
GetModuleHandleA
WriteProcessMemory
DeleteFileA
GetCurrentProcess
QueryPerformanceCounter
QueryDosDeviceA
CreateToolhelp32Snapshot
Process32Next
Process32First
ExpandEnvironmentStringsA
OpenProcess
WideCharToMultiByte
Sleep
GetExitCodeProcess
GetBinaryTypeA
TerminateProcess
GetLogicalDriveStringsA
SetLastError
GetLongPathNameA
CreateFileW
GetTickCount
GetCurrentProcessId
DeviceIoControl
GetNativeSystemInfo
WaitForSingleObject
CreateMutexA
GetCurrentThreadId
OutputDebugStringA
GetVersionExA
CreateThread
SetEvent
InitializeCriticalSection
CreateEventA
LeaveCriticalSection
EnterCriticalSection
GetDriveTypeA
ExitThread
FindFirstFileA
FindClose
WaitForMultipleObjects
FindNextFileA
FindResourceA
LoadResource
WriteFile
SizeofResource
LockResource
GetCurrentDirectoryA
SetStdHandle
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetModuleFileNameA
GetStringTypeW
SetFilePointerEx
ReadConsoleW
GetModuleHandleW
GetStartupInfoW
TlsFree
VirtualFree
UnmapViewOfFile
MapViewOfFile
CreateProcessA
GetFileSize
CreateFileA
ResumeThread
IsWow64Process
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetConsoleMode
GetConsoleCP
FlushFileBuffers
DeleteCriticalSection
LoadLibraryExW
OutputDebugStringW
HeapSize
AreFileApisANSI
ExitProcess
GetProcessHeap
MultiByteToWideChar
GetLastError
FreeResource
GetCPInfo
GetOEMCP
HeapFree
EncodePointer
DecodePointer
GetStdHandle
GetFileType
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
HeapReAlloc
ReadFile
GetCommandLineA
RaiseException
RtlUnwind
IsValidCodePage
GetACP
SetEndOfFile
user32
PostQuitMessage
DispatchMessageW
MoveWindow
GetWindowThreadProcessId
DefWindowProcW
UpdateWindow
SendMessageW
CreateWindowExW
DeregisterShellHookWindow
ShowWindow
GetWindowTextA
LoadIconW
RegisterClassExW
TranslateMessage
DestroyWindow
GetClassNameA
GetMessageW
EndTask
RegisterWindowMessageW
RegisterShellHookWindow
LoadCursorW
GetClientRect
advapi32
RegOpenKeyExA
RegQueryValueExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegSetValueExA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
psapi
EnumProcessModules
GetModuleBaseNameA
GetProcessImageFileNameA
ws2_32
inet_addr
connect
WSAGetLastError
closesocket
WSAStartup
htons
recv
socket
gethostbyname
send
iphlpapi
GetAdaptersInfo
shlwapi
PathIsDirectoryA
Sections
.text Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 152KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 787KB - Virtual size: 787KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ