D:\temp_build\hd_ver1028_b6_cfa8b72e\bin\Launch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ecc7427b971ed714748422af7d7709600fdce12f2d859137a4f3ff799a4adc73.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecc7427b971ed714748422af7d7709600fdce12f2d859137a4f3ff799a4adc73.exe
Resource
win10v2004-20240802-en
General
-
Target
ecc7427b971ed714748422af7d7709600fdce12f2d859137a4f3ff799a4adc73
-
Size
7.1MB
-
MD5
c89b948089b6fa40d205edfe51b84ba0
-
SHA1
9dbeaa8e856d961347b698396646c3e46a0ebfcb
-
SHA256
ecc7427b971ed714748422af7d7709600fdce12f2d859137a4f3ff799a4adc73
-
SHA512
f43c5fd069ac6fae29c71074be1b164763f34471e56233c1fac59db7d0ee5472439bc135d516f48d4f781aba8a1fb7fe7285c69981110d3512996716522ed665
-
SSDEEP
98304:qShRWqmncAmFK9+tWlLkVpu//qnZg4ZVlUHuWiKc7615ZPaReLlxDAEcJFvMJKLf:qSOM/K9FRuuSZXU+mDARyD8kJKdO2L/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ecc7427b971ed714748422af7d7709600fdce12f2d859137a4f3ff799a4adc73
Files
-
ecc7427b971ed714748422af7d7709600fdce12f2d859137a4f3ff799a4adc73.exe windows:6 windows x64 arch:x64
a09dcfac1dc125db437cd4a2a82b1583
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
getnameinfo
winmm
PlaySoundW
crypt32
CertOpenStore
shlwapi
StrCpyNW
gdiplus
GdipGetPenStartCap
comctl32
_TrackMouseEvent
msimg32
AlphaBlend
imm32
ImmSetCompositionWindow
dwmapi
DwmSetWindowAttribute
kernel32
LoadLibraryExA
user32
GetMenuDefaultItem
gdi32
GetTextFaceW
comdlg32
GetSaveFileNameW
winspool.drv
ClosePrinter
advapi32
CryptAcquireContextA
shell32
SetCurrentProcessExplicitAppUserModelID
uxtheme
DrawThemeText
ole32
PropVariantClear
oleaut32
SysFreeString
uiautomationcore
UiaRaiseAutomationEvent
d2d1
ord1
dwrite
DWriteCreateFactory
dbghelp
SymCleanup
oleacc
CreateStdAccessibleObject
bcrypt
BCryptGenRandom
winhttp
WinHttpReceiveResponse
wldap32
ord133
Sections
.text Size: - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 956KB - Virtual size: 955KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ