D:\temp_build\hd_ver1028_b6_cfa8b72e\bin\Launch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
feb6119b3c78befe6ca78c2ea2ddc5777a90db9ca998bf46a3650b9c2b587e55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
feb6119b3c78befe6ca78c2ea2ddc5777a90db9ca998bf46a3650b9c2b587e55.exe
Resource
win10v2004-20240802-en
General
-
Target
feb6119b3c78befe6ca78c2ea2ddc5777a90db9ca998bf46a3650b9c2b587e55
-
Size
7.1MB
-
MD5
04b85087a0623c0ff6cbf6f3b59481b3
-
SHA1
2a8266209cb3bedb0e9c7d16b7a2b4cf29be7a99
-
SHA256
feb6119b3c78befe6ca78c2ea2ddc5777a90db9ca998bf46a3650b9c2b587e55
-
SHA512
325aebcd48ee081722d886ce19408747b89aa1ae4b05580f815c3084082cd819a231695bffee7f36bf71a39e22b87830a00c859e1674ab590132e304c83c9b68
-
SSDEEP
196608:qSOM/K9FRuuSZXU+mDARyD8j0Kg8RjmqIO:FOBrRuZUvuf88Rj0O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource feb6119b3c78befe6ca78c2ea2ddc5777a90db9ca998bf46a3650b9c2b587e55
Files
-
feb6119b3c78befe6ca78c2ea2ddc5777a90db9ca998bf46a3650b9c2b587e55.exe windows:6 windows x64 arch:x64
a09dcfac1dc125db437cd4a2a82b1583
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
getnameinfo
winmm
PlaySoundW
crypt32
CertOpenStore
shlwapi
StrCpyNW
gdiplus
GdipGetPenStartCap
comctl32
_TrackMouseEvent
msimg32
AlphaBlend
imm32
ImmSetCompositionWindow
dwmapi
DwmSetWindowAttribute
kernel32
LoadLibraryExA
user32
GetMenuDefaultItem
gdi32
GetTextFaceW
comdlg32
GetSaveFileNameW
winspool.drv
ClosePrinter
advapi32
CryptAcquireContextA
shell32
SetCurrentProcessExplicitAppUserModelID
uxtheme
DrawThemeText
ole32
PropVariantClear
oleaut32
SysFreeString
uiautomationcore
UiaRaiseAutomationEvent
d2d1
ord1
dwrite
DWriteCreateFactory
dbghelp
SymCleanup
oleacc
CreateStdAccessibleObject
bcrypt
BCryptGenRandom
winhttp
WinHttpReceiveResponse
wldap32
ord133
Sections
.text Size: - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 956KB - Virtual size: 955KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ