C:\Users\DODO\Videos\TwoStageSearch\TwoStageSearch\TwoStageSearch\Release\TwoStageSearch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2bf558da186d6b098eb2dcdec3a02f8b605461d890dc667c94d9fb83dee94321.exe
Resource
win7-20240729-en
General
-
Target
2bf558da186d6b098eb2dcdec3a02f8b605461d890dc667c94d9fb83dee94321
-
Size
667KB
-
MD5
d2032358048ac658592404b3900ded51
-
SHA1
2aea94a8b195fbba79906e641dd701d7c44ff414
-
SHA256
2bf558da186d6b098eb2dcdec3a02f8b605461d890dc667c94d9fb83dee94321
-
SHA512
8254d7c73be5c52017e19a1079c710571fffdf87f675d464a36460ac74ff0bddb4b7306a1551daa98d19955f260dd7fa273b6529a7b885fd98491c7e0611822e
-
SSDEEP
12288:76JJG//tnC5VCFSoDpaQlHfl6mCiWDaBMNCAbnG:76J6/tniVNoDgQVN6mCip9AbG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2bf558da186d6b098eb2dcdec3a02f8b605461d890dc667c94d9fb83dee94321
Files
-
2bf558da186d6b098eb2dcdec3a02f8b605461d890dc667c94d9fb83dee94321.exe windows:6 windows x86 arch:x86
beb5959bb1e83e2e3f4789da7e63bdcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetExitCodeProcess
ReadFile
CreateFileW
GetTempPathW
GetFileSizeEx
GetLastError
GetCurrentDirectoryW
GetProcAddress
VirtualAlloc
FindClose
SetCurrentDirectoryW
FindNextFileW
CloseHandle
DeleteFileW
FlushFileBuffers
GetFullPathNameA
WriteConsoleW
CreateProcessW
WaitForSingleObject
ReadConsoleW
SetEndOfFile
GetTimeZoneInformation
SetStdHandle
RtlUnwind
HeapReAlloc
OutputDebugStringW
LoadLibraryExW
FreeLibrary
SetConsoleCtrlHandler
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LoadLibraryW
GetStringTypeW
SetEnvironmentVariableW
LeaveCriticalSection
EnterCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
RaiseException
GetFileAttributesExW
CreateSemaphoreW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
HeapSize
GetModuleFileNameW
WriteFile
GetStdHandle
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
GetCurrentThreadId
GetModuleHandleW
GetLocaleInfoW
FindFirstFileExW
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetCurrentThread
SetLastError
GetCPInfo
GetOEMCP
SetFilePointer
FindFirstFileW
CreateFileA
GetTempFileNameW
FatalAppExitA
GetACP
IsValidCodePage
GetCommandLineW
HeapFree
HeapAlloc
EncodePointer
DecodePointer
GetDriveTypeW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
IsDebuggerPresent
IsProcessorFeaturePresent
SetEnvironmentVariableA
user32
EndPaint
ClientToScreen
DestroyWindow
GetWindowTextLengthW
TranslateAcceleratorW
ScreenToClient
GetWindowRect
SetActiveWindow
GetMessageW
SendInput
PostQuitMessage
SetKeyboardState
GetKeyState
GetSubMenu
GetFocus
DialogBoxParamW
GetParent
LoadCursorW
GetClipCursor
FindWindowW
GetClientRect
SetFocus
BeginPaint
wsprintfW
TranslateMessage
LoadAcceleratorsW
GetKeyboardState
GetMenu
RegisterClassExW
OffsetRect
GetAsyncKeyState
MessageBoxA
SetCursorPos
LoadMenuW
GetAncestor
GetWindowTextW
PeekMessageW
GetDlgItem
EndDialog
GetDesktopWindow
GetCursorPos
LoadStringW
EnumChildWindows
ShowWindow
SetMenu
GetSysColorBrush
LoadBitmapW
CreateDialogParamW
FindWindowExW
ClipCursor
CreateWindowExW
SetMenuDefaultItem
MessageBoxW
GetComboBoxInfo
GetSystemMetrics
IsWindowVisible
SendMessageW
UpdateWindow
GetDlgCtrlID
SetWindowTextW
DefWindowProcW
CopyRect
GetWindow
MoveWindow
DispatchMessageW
LoadIconW
gdi32
CreateFontW
DeleteObject
advapi32
CryptAcquireContextA
shell32
ShellExecuteW
SHOpenWithDialog
ShellExecuteExW
comctl32
ord413
ImageList_Add
ImageList_Create
ord410
shlwapi
ord191
PathMatchSpecW
Exports
Exports
T5676thdrgddhf
Sections
.text Size: 385KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ