b:\source\source.IC\60581\Release_WDEXE_174\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d59a58435729b869f9a4bb849017d9fed6bdd3bcd0a7ff24dc36a695139c5f81.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d59a58435729b869f9a4bb849017d9fed6bdd3bcd0a7ff24dc36a695139c5f81.exe
Resource
win10v2004-20240802-en
General
-
Target
d59a58435729b869f9a4bb849017d9fed6bdd3bcd0a7ff24dc36a695139c5f81
-
Size
717KB
-
MD5
732b666ec1ddfe3ea816777482a76ae0
-
SHA1
f97d371572544b7a99d021b438664456263501fa
-
SHA256
d59a58435729b869f9a4bb849017d9fed6bdd3bcd0a7ff24dc36a695139c5f81
-
SHA512
9e35a04e27c0b0fda720a91c0b7e3bcc6c5cdda2a01d6b371a18331d3ad922c54da8f87f3006244d85fb066dcccef00f48f2f5519830288829f1d4ed333be4c9
-
SSDEEP
12288:HT2x1xPGuhIL5ncq52CLnnL/OjIiMOOHMWX7RTjwANX8GXj+gYBP:zknGuhIlncq5hLDOjIvOOsOjwOXpXj+b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d59a58435729b869f9a4bb849017d9fed6bdd3bcd0a7ff24dc36a695139c5f81
Files
-
d59a58435729b869f9a4bb849017d9fed6bdd3bcd0a7ff24dc36a695139c5f81.exe windows:4 windows x86 arch:x86
b928ebb4f2c454beca001ab57dc981f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_except_handler3
_onexit
__dllonexit
_lfind
vsprintf
memcmp
iswspace
_vsnprintf
strchr
realloc
towupper
wcspbrk
_wmakepath
_wstati64
_wcsupr
strcat
memmove
wcschr
atoi
strlen
wcsstr
vswprintf
wcscmp
_vsnwprintf
_wcsnicmp
swprintf
_wtoi
_purecall
strncmp
memcpy
_wcsicmp
gmtime
time
free
malloc
memset
wcsrchr
wcsncpy
wcscpy
wcslen
wcscat
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
kernel32
ReleaseMutex
RaiseException
InterlockedExchange
GetSystemDefaultLangID
CreateThread
TerminateThread
ResumeThread
CreateProcessW
ReleaseSemaphore
CreateSemaphoreW
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetDriveTypeW
GetFullPathNameW
FindNextFileW
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
CreateDirectoryW
CopyFileW
MoveFileW
DeleteFileW
GetTickCount
CreateFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
UnlockFile
LockFileEx
LockFile
SetFilePointer
WriteFile
GetVolumeInformationW
GetLogicalDriveStringsW
GetFileInformationByHandle
LoadLibraryW
GetVersionExW
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchangeAdd
InterlockedIncrement
WritePrivateProfileStringW
CreateMailslotW
ExpandEnvironmentStringsW
GetLocalTime
GetComputerNameW
GetProfileStringW
ReadFile
GetExitCodeProcess
GetMailslotInfo
Sleep
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
GetLastError
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CreateEventW
GetStartupInfoW
MulDiv
SetEvent
CreateMutexW
WaitForSingleObject
OpenFileMappingW
FreeLibrary
FindResourceW
LoadResource
LockResource
FreeResource
GetTempPathW
GetTempFileNameW
GetCurrentProcessId
FormatMessageW
LocalFree
GetCommandLineW
ExitProcess
Exports
Exports
CommandeComposante
DeclareProxy
Execution
LibereMutex
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ