D:\a\1\s\Win32\Release\regjump.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fa19c5db80fa7ec48f9d38a9b13afee0N.exe
Resource
win7-20240729-en
General
-
Target
fa19c5db80fa7ec48f9d38a9b13afee0N.exe
-
Size
915KB
-
MD5
fa19c5db80fa7ec48f9d38a9b13afee0
-
SHA1
f1b341fc1f054b2a16decb59d9dcaea3d5b5ca9a
-
SHA256
1c91a5b2cf9baae99d77570712935de5e42f491bfc9c3ea6634c3716c4116aa1
-
SHA512
25e094a5ae5a38b89386613b7e685658a5c58b9de925ab11c651cf8b54377a175bf5a66b0c78a6d7c734fb7986ad68f23a7d8b34374e8062115f19e6fa593d55
-
SSDEEP
12288:4d1dYQq5gnEiz1S1yEs7U79BuXzQ4RJsN71YoiqIpRNVJnLnFhRqppMjeBhvxGfY:2Eiz1f7U79r4RqNOoiqcRJ/RBoqfOL2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa19c5db80fa7ec48f9d38a9b13afee0N.exe
Files
-
fa19c5db80fa7ec48f9d38a9b13afee0N.exe.exe windows:6 windows x86 arch:x86
e80b2e3b401f381b46c54e6390fd1833
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
HeapSize
SetFilePointerEx
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
SetConsoleCtrlHandler
GetProcessHeap
GetStringTypeW
ReadFile
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
WriteConsoleW
GlobalLock
GlobalUnlock
LoadLibraryA
OpenProcess
GetCurrentProcess
CreateProcessA
GetLastError
Sleep
CloseHandle
ExpandEnvironmentStringsA
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleA
GetFileType
GetCommandLineW
GetStdHandle
LoadLibraryExA
GetVersionExA
SetStdHandle
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetConsoleCP
WriteFile
GetModuleFileNameW
GetCommandLineA
GetCurrentThread
HeapFree
HeapAlloc
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WideCharToMultiByte
CreateFileW
GetConsoleMode
SetConsoleMode
GetNumberOfConsoleInputEvents
ReadConsoleInputW
PeekConsoleInputA
ReadConsoleW
OutputDebugStringW
FindClose
DecodePointer
user32
GetWindowThreadProcessId
FindWindowExA
FindWindowA
SetForegroundWindow
SetFocus
GetClipboardData
CloseClipboard
OpenClipboard
ShowWindow
EnumDisplaySettingsA
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
WaitForInputIdle
gdi32
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
EndPage
comdlg32
PrintDlgA
advapi32
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
OpenProcessToken
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
Sections
.text Size: 267KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE