RWTHLO.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0b2d2ce382b61a6029b614b50af38b55a657545cb4c558013966843be7333b95.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0b2d2ce382b61a6029b614b50af38b55a657545cb4c558013966843be7333b95.exe
Resource
win10v2004-20240802-en
General
-
Target
0b2d2ce382b61a6029b614b50af38b55a657545cb4c558013966843be7333b95
-
Size
615KB
-
MD5
b13eaff9f26d8da1172b27728170cf98
-
SHA1
740b396ef37f458ce39f9b47146a6a49911778b4
-
SHA256
0b2d2ce382b61a6029b614b50af38b55a657545cb4c558013966843be7333b95
-
SHA512
73b1a1ff1cf74bdb2d1c01c4077c4bc51192fe2d54c9ddc39c692478bdfb2443f62e100fb04b175ecd823275e8799a8a36b0ebf6587c13ad22cd50ba34918409
-
SSDEEP
12288:4HFKPCAXPtah44Sh18LCwRwTvkYuKIM9AakBO:4hAwOha9wTvkYu3kALO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b2d2ce382b61a6029b614b50af38b55a657545cb4c558013966843be7333b95
Files
-
0b2d2ce382b61a6029b614b50af38b55a657545cb4c558013966843be7333b95.exe windows:6 windows x64 arch:x64
c53028da04058e5a29dfc2c5cfa0c951
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-synch-l1-2-0
WaitOnAddress
WakeByAddressSingle
WakeByAddressAll
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
LoadLibraryA
GetProcAddress
WriteProcessMemory
CreateProcessA
GetCurrentProcess
CloseHandle
GetCurrentThread
CreateFileW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetLastError
AddVectoredExceptionHandler
SetThreadStackGuarantee
WaitForSingleObject
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
GetStdHandle
GetCurrentProcessId
HeapFree
HeapReAlloc
lstrlenW
ReleaseMutex
GetProcessHeap
HeapAlloc
GetConsoleMode
GetModuleHandleW
FormatMessageW
ExitProcess
IsProcessorFeaturePresent
MultiByteToWideChar
WriteConsoleW
GetModuleHandleA
WaitForSingleObjectEx
CreateMutexA
GetSystemTimeAsFileTime
GetCurrentThreadId
ntdll
RtlNtStatusToDosError
NtReadVirtualMemory
NtAllocateVirtualMemory
NtWriteFile
NtWaitForSingleObject
NtCreateThreadEx
NtProtectVirtualMemory
NtWriteVirtualMemory
psapi
EnumProcessModulesEx
GetModuleBaseNameW
vcruntime140
memset
__CxxFrameHandler3
__current_exception
__current_exception_context
memcpy
memcmp
memmove
__C_specific_handler
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_seh_filter_exe
terminate
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_register_onexit_function
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
_exit
_crt_atexit
_initialize_onexit_table
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 314KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ