tvpwin32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ambitious_mission.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ambitious_mission.exe
Resource
win10v2004-20240802-en
General
-
Target
ambitious_mission.exe
-
Size
4.4MB
-
MD5
12dbe1a4fcf29ca53dfc92eabbd60d33
-
SHA1
c3ca66814275b2346d398f250040446b6637dfda
-
SHA256
41211856f1fa6de3152e19d7a84574bff9f54f9c2e29262c2b0c3cd06a663fea
-
SHA512
94dfab426d50269f14ce689c8a2e579322a704971373a79f4dc8c6d1c2a1066d20963c201184766d0bedcb8db0f9137a3be86383c3622143361b53ebe1251a53
-
SSDEEP
98304:H68Y7OydqjTTsBs7SBTSJM9HKmq5qW6K277cR9ou/NMmh:anOydqjcxTr9H7q88ou/N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ambitious_mission.exe
Files
-
ambitious_mission.exe.exe windows:5 windows x86 arch:x86
277b6e27b5785f425f2394d28495d60e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualQuery
FindResourceW
LoadResource
IsBadReadPtr
OpenProcess
GlobalAlloc
Sleep
SizeofResource
GetVersionExW
GlobalFree
LockResource
GlobalMemoryStatusEx
SetCurrentDirectoryW
HeapSetInformation
GetCurrentThreadId
GetSystemTime
CreateMutexW
HeapQueryInformation
GetProcessHeaps
HeapWalk
LoadLibraryExW
GetNativeSystemInfo
HeapAlloc
HeapFree
VirtualFree
SetLastError
VirtualAlloc
LoadLibraryA
VirtualProtect
GetConsoleMode
FreeConsole
WriteConsoleW
GetLocalTime
SetConsoleTitleW
GetProcessAffinityMask
SetThreadAffinityMask
GlobalMemoryStatus
TerminateProcess
GetCurrentThread
SetThreadPriority
GlobalDeleteAtom
GlobalAddAtomW
MulDiv
OutputDebugStringW
FormatMessageW
SearchPathW
GetSystemDirectoryW
GetWindowsDirectoryW
WideCharToMultiByte
IsDBCSLeadByte
MultiByteToWideChar
GlobalLock
GlobalUnlock
InterlockedIncrement
InterlockedDecrement
WaitForSingleObject
InterlockedCompareExchange
SetEvent
ExitThread
CreateEventW
SetThreadIdealProcessor
GetSystemInfo
GetThreadPriority
SuspendThread
ResumeThread
CreateThread
HeapDestroy
HeapCreate
LocalSize
GetTempFileNameW
SetProcessAffinityMask
SetEnvironmentVariableA
GetExitCodeProcess
GetCurrentDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleFileNameA
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetTimeZoneInformation
GetFileType
GetFileAttributesExW
InitializeSListHead
GetOEMCP
GetACP
IsValidCodePage
HeapSize
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCPInfo
RaiseException
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
GetThreadTimes
DeleteFileA
AreFileApisANSI
GetModuleHandleExW
HeapReAlloc
IsProcessorFeaturePresent
IsDebuggerPresent
DecodePointer
EncodePointer
GetStringTypeW
ExitProcess
GetFullPathNameW
LocalFree
LocalLock
LocalUnlock
GetVolumeInformationW
GetCurrentProcessId
DeleteFileW
RemoveDirectoryW
GetTempPathW
GetFileAttributesW
CreateFileW
GetTickCount
CreateDirectoryW
SetEndOfFile
GetDriveTypeW
SetFilePointer
GetFileSize
CloseHandle
DuplicateHandle
CreatePipe
SetStdHandle
GetStdHandle
FlushFileBuffers
GetModuleFileNameW
ReadFile
WriteFile
GetCurrentProcess
CreateProcessW
FindNextFileW
FindClose
GetProcAddress
LoadLibraryW
FreeLibrary
FindFirstFileW
GetLastError
GetModuleHandleW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetProcessHeap
SetEnvironmentVariableW
HeapCompact
user32
SetTimer
ReleaseDC
GetDC
ChangeDisplaySettingsW
MessageBoxW
GetSysColor
SetWindowPos
GetParent
GetWindowRect
DefWindowProcW
CreateWindowExW
SetWindowLongW
GetWindowLongW
RegisterClassExW
GetClassInfoExW
PostMessageW
DestroyWindow
GetWindowThreadProcessId
SendMessageW
SystemParametersInfoW
EnumDisplaySettingsW
LoadCursorFromFileW
PostQuitMessage
KillTimer
CloseClipboard
GetPriorityClipboardFormat
IsClipboardFormatAvailable
GetClipboardData
OpenClipboard
SetClipboardData
LoadStringW
ClientToScreen
SetWindowRgn
SetCapture
GetCursorPos
EnumWindows
GetFocus
EnumDisplaySettingsExW
SetFocus
GetForegroundWindow
GetKeyboardLayout
SetCursorPos
MonitorFromWindow
DestroyCaret
CreateCaret
SetCaretPos
EndPaint
GetWindowTextLengthW
GetSystemMenu
ScreenToClient
SetActiveWindow
GetMessageExtraInfo
GetKeyState
TrackMouseEvent
IsWindowEnabled
GetClientRect
BeginPaint
SetPropW
GetCapture
GetMenu
LoadIconW
SetRect
InvalidateRect
GetWindowTextW
GetMenuItemCount
AdjustWindowRectEx
ReleaseCapture
IsWindowVisible
UpdateWindow
SetWindowTextW
SetCursor
LoadCursorW
WindowFromPoint
GetCursor
DialogBoxParamW
GetDlgItem
EndDialog
SetDlgItemTextW
EnableWindow
TranslateAcceleratorW
DestroyAcceleratorTable
IsIconic
CreateAcceleratorTableW
WaitMessage
TranslateMessage
LoadAcceleratorsW
PeekMessageW
ShowWindow
DispatchMessageW
GetAsyncKeyState
GetSystemMetrics
GetMonitorInfoW
gdi32
EnumFontFamiliesExW
GetStockObject
GetTextMetricsW
CreateFontIndirectW
SelectObject
GetFontData
DeleteObject
GetObjectW
ExtCreateRegion
CreateRectRgn
GetTextExtentPoint32W
GetOutlineTextMetricsW
GetGlyphOutlineW
GetDeviceCaps
CreateCompatibleDC
CreateDIBSection
EnumFontsW
DeleteDC
CreateDIBitmap
GetPixel
CombineRgn
SetPixel
CreateCompatibleBitmap
comdlg32
GetSaveFileNameW
GetOpenFileNameW
CommDlgExtendedError
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
DragFinish
SHGetPathFromIDListW
ShellExecuteW
DragQueryFileW
DragAcceptFiles
SHBrowseForFolderW
ole32
CLSIDFromString
CoTaskMemFree
CoCreateGuid
CoTaskMemAlloc
StringFromGUID2
winmm
timeEndPeriod
timeGetTime
timeGetDevCaps
timeBeginPeriod
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
mpr
WNetGetUniversalNameW
shlwapi
PathIsDirectoryW
PathFileExistsW
imm32
ImmGetContext
ImmGetOpenStatus
ImmIsIME
ImmSetCompositionFontW
ImmSetConversionStatus
ImmSetOpenStatus
ImmAssociateContext
ImmGetConversionStatus
ImmSetCompositionWindow
ImmReleaseContext
dbghelp
MiniDumpWriteDump
Sections
.text Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 699KB - Virtual size: 698KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 681KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 787KB - Virtual size: 786KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 210KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ