G:\Checkpoints\TPDrv\builderDerek2\SynTPEnh\x64\Release\SynTPEnh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f8f7323e0bb20f8a65383c6d32392bc00ce0b2cb4dfd518d1c45d524009b6df4.exe
Resource
win7-20240903-en
General
-
Target
f8f7323e0bb20f8a65383c6d32392bc00ce0b2cb4dfd518d1c45d524009b6df4
-
Size
4.7MB
-
MD5
2456bd71653a4a8729021ba8351e9003
-
SHA1
46493917dbd0d87035f3e3cd076f3374ec00186f
-
SHA256
f8f7323e0bb20f8a65383c6d32392bc00ce0b2cb4dfd518d1c45d524009b6df4
-
SHA512
0c3f5165328b232c2a246e964bcd5d1f9aa7abff84b7a2c57391c275ed061f236043a442e51f09c3c31dad71a3e98fcbdc16bd7d981b3f5c3df8ecc7e2495df1
-
SSDEEP
49152:ISahqdLVhEpJcmMLib6vnj40zE995ZbTEgBnuglmolV0KLEQi6V+lh:ISWgjgcmtb4jtJgHca83
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8f7323e0bb20f8a65383c6d32392bc00ce0b2cb4dfd518d1c45d524009b6df4
Files
-
f8f7323e0bb20f8a65383c6d32392bc00ce0b2cb4dfd518d1c45d524009b6df4.exe windows:5 windows x64 arch:x64
cd823c8cce436f5293a3b70028162cba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
mixerGetLineInfoW
mixerGetLineControlsW
mixerGetControlDetailsW
PlaySoundW
mixerGetNumDevs
mixerGetDevCapsW
mixerOpen
mixerClose
psapi
EnumProcessModules
GetModuleFileNameExW
netapi32
NetApiBufferFree
NetUserGetInfo
NetWkstaUserGetInfo
rpcrt4
RpcStringFreeW
UuidToStringW
imm32
ImmIsIME
comctl32
InitCommonControlsEx
powrprof
CallNtPowerInformation
kernel32
GetSystemDefaultLangID
GetModuleHandleW
WideCharToMultiByte
LoadLibraryExW
Beep
GetEnvironmentVariableW
OpenEventW
OpenProcess
GetWindowsDirectoryW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetCommandLineW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
DecodePointer
RaiseException
TryEnterCriticalSection
SetPriorityClass
GetPriorityClass
GetSystemDirectoryW
CopyFileW
MoveFileExW
VirtualAllocEx
VirtualFreeEx
ReadProcessMemory
GetSystemTime
lstrcmpiW
SystemTimeToFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
DeviceIoControl
DeactivateActCtx
GetSystemInfo
FileTimeToSystemTime
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
LocalFree
TerminateProcess
lstrlenW
GetModuleHandleExW
CreateProcessW
IsWow64Process
QueryPerformanceCounter
QueryPerformanceFrequency
lstrlenA
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetCPInfo
RtlUnwindEx
RtlLookupFunctionEntry
RtlPcToFileHeader
EncodePointer
GetStringTypeW
IsDebuggerPresent
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
lstrcmpW
ExitProcess
IsValidCodePage
GetACP
GetOEMCP
GetConsoleCP
GetConsoleMode
GetStdHandle
ActivateActCtx
ReleaseActCtx
CreateActCtxW
GetSystemPowerStatus
WaitForMultipleObjects
GetModuleFileNameW
GetTickCount
ProcessIdToSessionId
TlsSetValue
TlsGetValue
TlsAlloc
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetFileAttributesW
TerminateThread
MultiByteToWideChar
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
ExpandEnvironmentStringsW
LoadLibraryW
GetProcAddress
FreeLibrary
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
CreateMutexW
ReleaseMutex
GetOverlappedResult
CreateThread
WaitForMultipleObjectsEx
WaitForSingleObject
ResetEvent
SetEvent
Sleep
CreateEventW
WaitNamedPipeW
CreateNamedPipeW
DisconnectNamedPipe
ConnectNamedPipe
GetLastError
CloseHandle
WriteFileEx
WriteFile
ReadFileEx
ReadFile
FlushFileBuffers
CreateFileW
GetFileAttributesExW
SetFileAttributesW
EnumSystemLocalesW
WTSGetActiveConsoleSessionId
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TlsFree
GetStartupInfoW
GetFileType
SetFilePointerEx
SetStdHandle
WriteConsoleW
ReadConsoleW
SetEnvironmentVariableW
SetEndOfFile
SetEnvironmentVariableA
GetLocalTime
user32
MonitorFromWindow
CheckDlgButton
CreateDialogParamW
IsWindow
PostQuitMessage
PostThreadMessageW
SendNotifyMessageW
SwapMouseButton
DispatchMessageW
TranslateMessage
GetMessageW
SetClassLongPtrW
RedrawWindow
BringWindowToTop
SetLayeredWindowAttributes
EnumDesktopWindows
CreateIconIndirect
DestroyIcon
LoadIconW
IsRectEmpty
SetRectEmpty
GetClientRect
RegisterClassW
SetRect
SetWindowRgn
EndPaint
BeginPaint
DestroyWindow
SetMenuDefaultItem
TrackPopupMenu
AppendMenuW
EnableMenuItem
CheckMenuItem
DestroyMenu
CreatePopupMenu
LoadStringW
LockWorkStation
GetScrollInfo
GetWindow
GetWindowLongW
ScreenToClient
InvalidateRect
MapVirtualKeyW
SendDlgItemMessageW
GetDlgItemTextW
MoveWindow
ShowWindowAsync
ShowWindow
RegisterWindowMessageW
LoadKeyboardLayoutW
SetWindowTextW
EnableWindow
GetKeyNameTextW
EnumDisplayDevicesW
SetDlgItemTextW
DialogBoxParamW
CallWindowProcW
GetWindowInfo
GetGUIThreadInfo
EnumWindows
WindowFromPoint
IsWindowEnabled
GetKeyboardLayout
FindWindowW
GetWindowThreadProcessId
GetParent
GetDesktopWindow
FillRect
KillTimer
SetTimer
SendMessageTimeoutW
DrawEdge
MessageBeep
GetClassNameW
GetForegroundWindow
IsZoomed
IsIconic
IsWindowVisible
EnumChildWindows
GetDlgItem
EndDialog
SystemParametersInfoW
CopyIcon
GetClassLongPtrW
SetForegroundWindow
GetWindowPlacement
GetClassInfoExW
WaitForInputIdle
AttachThreadInput
WinHelpW
GetSysColor
CopyImage
LoadImageW
SetSystemCursor
DestroyCursor
LoadCursorFromFileW
LoadCursorW
LoadBitmapW
SetWindowLongPtrW
GetWindowLongPtrW
PtInRect
ClipCursor
wsprintfW
OffsetRect
IntersectRect
ScrollDC
UpdateWindow
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
SetWindowLongW
MessageBoxW
FindWindowExW
EnumDisplaySettingsW
IsDialogMessageW
CallNextHookEx
SetWindowsHookExW
DrawTextW
GetDlgCtrlID
GetAncestor
SetFocus
EqualRect
SetCursor
GetWindowRect
ReleaseDC
GetDC
SetWindowPos
CreateWindowExW
RegisterClassExW
DefWindowProcW
SendMessageW
GetDoubleClickTime
GetCursorPos
GetSystemMetrics
GetAsyncKeyState
PostMessageW
EnumThreadWindows
ClientToScreen
ReleaseCapture
GetWindowTextW
SetCapture
SetCursorPos
MsgWaitForMultipleObjects
SendInput
CharNextW
CharUpperW
GetKeyState
IsDlgButtonChecked
SetMenuItemBitmaps
gdi32
MoveToEx
EndPage
StartPage
EndDoc
LineTo
StartDocW
CreatePatternBrush
CreatePen
SetROP2
Rectangle
GetClipBox
CreateBrushIndirect
TextOutW
SetTextColor
SetBkMode
SetBkColor
SetMapMode
GetMapMode
CreateRoundRectRgn
CreateDCW
GdiFlush
SelectClipRgn
Ellipse
CreateSolidBrush
CreateRectRgn
CreateEllipticRgn
CreateBitmap
GetPixel
ExtCreateRegion
GetTextExtentPoint32W
StretchBlt
SelectObject
GetStockObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetObjectW
GetDeviceCaps
AbortDoc
CreateDIBitmap
DeleteObject
comdlg32
PrintDlgW
CommDlgExtendedError
GetOpenFileNameW
advapi32
RegEnumKeyW
RegDeleteValueW
RegCreateKeyW
TraceMessage
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
UnregisterTraceGuids
RegisterTraceGuidsW
FreeSid
AllocateAndInitializeSid
EqualSid
GetTokenInformation
OpenProcessToken
RegOpenKeyW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
GetUserNameW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegQueryInfoKeyW
RegNotifyChangeKeyValue
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumValueW
shell32
SHGetFolderPathW
DragFinish
ShellExecuteW
SHGetSpecialFolderPathW
ShellExecuteExW
DragQueryFileW
Shell_NotifyIconW
ole32
CoCreateInstance
PropVariantClear
CLSIDFromProgID
StringFromGUID2
CoCreateGuid
CoUninitialize
CoRevokeClassObject
CoAddRefServerProcess
CoReleaseServerProcess
CoInitialize
oleaut32
SysStringLen
SysAllocString
VariantInit
SysFreeString
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
GetActiveObject
VarCmp
VariantCopy
VariantClear
shlwapi
PathFindFileNameW
SHDeleteKeyW
PathFileExistsW
SHCopyKeyW
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 484KB - Virtual size: 484KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 984KB - Virtual size: 1009KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE