D:\Jenkins\workspace\N_MBAMWsc\bin\x64\Release\MBAMwsc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
499d69d5ab8ba263975d5780e3b639a2a8905c50f2a1379bf972889c3913add4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
499d69d5ab8ba263975d5780e3b639a2a8905c50f2a1379bf972889c3913add4.exe
Resource
win10v2004-20240802-en
General
-
Target
0c3dda927e649661441905cd181c7e70.bin
-
Size
1.3MB
-
MD5
059975e5cdb42381868cdff73d79e327
-
SHA1
d93ae03448c61bd9ad9678981957e85f89183ba8
-
SHA256
b5ba08a578e3331f7d95545d76ed971ce91a784209cffadb3bded00473b6853b
-
SHA512
34318a362fe837211e86ef185a8ecf996f21352a00f717414398d6aaba921b0ffc3b402fb018f71eae9f09466c7493916fd8efad5f65ec4231951f316e4afe1c
-
SSDEEP
24576:FiKG8IeyCxnTn4rW+CNJl6hx/W02MZNNOIs+roYeO+2Q/1XVVVfBAqalL7SLggU0:UJxz0krWX7Y/W02MVOIJeO+JagUOxH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/499d69d5ab8ba263975d5780e3b639a2a8905c50f2a1379bf972889c3913add4.exe
Files
-
0c3dda927e649661441905cd181c7e70.bin.zip
Password: infected
-
499d69d5ab8ba263975d5780e3b639a2a8905c50f2a1379bf972889c3913add4.exe.exe windows:6 windows x64 arch:x64
Password: infected
3e4dc544b32d46ff67e39ad1b3dbfdc4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
crypt32
CertDuplicateCertificateContext
CertFindCertificateInStore
CertFreeCertificateContext
CertOpenStore
CertCloseStore
CertGetCertificateContextProperty
CertEnumCertificatesInStore
kernel32
GlobalFree
ExpandEnvironmentStringsW
GetLongPathNameW
GetWindowsDirectoryW
LocalAlloc
GetCurrentProcessId
GetFileSizeEx
ReadFile
WriteFile
GetFileSize
SetEndOfFile
GetStdHandle
FindNextFileW
FindClose
GetModuleHandleA
GetCurrentDirectoryW
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
TerminateProcess
GetStartupInfoW
SetEvent
ResetEvent
ReleaseMutex
CreateMutexW
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetEnvironmentVariableW
SetEnvironmentVariableW
GetFileType
DeleteFiber
QueryPerformanceCounter
ConvertFiberToThread
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FlushFileBuffers
GetFileInformationByHandle
DeleteFileW
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
GetFileAttributesExW
GetFileAttributesW
FindFirstFileW
WaitForMultipleObjects
GetCurrentThread
LoadLibraryW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GlobalAlloc
GetLogicalDriveStringsW
SetLastError
GetNativeSystemInfo
IsWow64Process
CopyFileW
LocalFree
GetCurrentProcess
GetSystemInfo
VerifyVersionInfoW
VerSetConditionMask
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringW
FileTimeToSystemTime
CloseHandle
CreateFileW
GetTimeZoneInformation
SystemTimeToTzSpecificLocalTime
GetLocalTime
GetModuleHandleW
GetProcAddress
GetTickCount
SleepEx
GetTickCount64
GetModuleFileNameW
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionEx
HeapFree
SwitchToThread
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetFullPathNameW
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
SetFilePointerEx
GetConsoleOutputCP
GetCommandLineW
GetCommandLineA
PeekNamedPipe
GetDriveTypeW
SetConsoleCtrlHandler
GetModuleHandleExW
ExitProcess
LoadLibraryExW
RtlPcToFileHeader
InterlockedPushEntrySList
RtlUnwindEx
InitializeSListHead
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RaiseException
IsDebuggerPresent
GetCPInfo
LCMapStringEx
EncodePointer
GetStringTypeW
FormatMessageW
CallNamedPipeW
GetProcessId
GetCurrentThreadId
Sleep
QueryDosDeviceW
FreeLibrary
user32
GetProcessWindowStation
MessageBoxW
GetUserObjectInformationW
advapi32
SetEntriesInAclW
CheckTokenMembership
FreeSid
StartServiceW
NotifyServiceStatusChangeW
CloseServiceHandle
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
IsTextUnicode
OpenThreadToken
OpenProcessToken
OpenSCManagerW
OpenServiceW
QueryServiceStatusEx
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
ReportEventW
RegisterEventSourceW
DeregisterEventSource
CryptDestroyHash
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
CreateWellKnownSid
GetSidSubAuthority
GetSidSubAuthorityCount
AreAllAccessesGranted
MapGenericMask
ConvertStringSidToSidW
ConvertSidToStringSidW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegUnLoadKeyW
RegSetValueExW
RegSaveKeyW
RegRestoreKeyW
RegQueryInfoKeyW
RegLoadAppKeyW
RegLoadKeyW
RegEnumValueW
RegEnumKeyW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
TreeSetNamedSecurityInfoW
SetSecurityInfo
GetSecurityInfo
SetNamedSecurityInfoW
GetNamedSecurityInfoW
DeleteAce
GetExplicitEntriesFromAclW
QueryServiceConfigW
AllocateAndInitializeSid
shell32
SHGetFolderPathW
ShellExecuteW
ole32
CoUninitialize
CoInitializeEx
CoGetClassObject
CoCreateInstance
StringFromGUID2
oleaut32
SystemTimeToVariantTime
VariantInit
VariantClear
VariantTimeToSystemTime
VariantChangeType
SysFreeString
SysAllocString
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
mpr
WNetGetConnectionW
netapi32
NetApiBufferFree
NetWkstaGetInfo
psapi
GetProcessImageFileNameW
sfc
SfcIsFileProtected
authz
AuthzInitializeContextFromSid
AuthzAccessCheck
AuthzFreeContext
AuthzFreeResourceManager
AuthzInitializeResourceManager
bcrypt
BCryptGetProperty
BCryptGenRandom
BCryptCreateHash
BCryptHashData
BCryptImportKeyPair
BCryptDestroyHash
BCryptCloseAlgorithmProvider
BCryptFinishHash
BCryptDestroyKey
BCryptVerifySignature
BCryptOpenAlgorithmProvider
ws2_32
recv
send
WSACleanup
WSAStartup
WSAGetLastError
WSASetLastError
closesocket
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 806KB - Virtual size: 806KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 30KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ