E:\WindowsProject1\WindowsProject1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6a29b2dc88e49af317c1a5bd46d73347c45874c3dab8044538214094548f65b4.exe
Resource
win7-20240903-en
General
-
Target
6a29b2dc88e49af317c1a5bd46d73347c45874c3dab8044538214094548f65b4
-
Size
1.0MB
-
MD5
3641dfd5dd6c72e667efaa1b26d76f35
-
SHA1
63a928dd9d77ddd0ac4fb1acd19c724f85c16517
-
SHA256
6a29b2dc88e49af317c1a5bd46d73347c45874c3dab8044538214094548f65b4
-
SHA512
8b9c4d36b81dbfbeb06ccc1aa0d78b0fd2d949a6f719dcea824c9a29ef74d35e09c517a8b43d3d26c3d32e75f1dba6bd988be2f3e4834249bfcfb39d4c9a97a9
-
SSDEEP
12288:zLZhj5ccLDRj4jSqOXqI6AwO+6ds1pJz6u0M+MVrO23n1+8:z5ccLDRjdqOXqI6Ae6oJzN4MVrO2348
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a29b2dc88e49af317c1a5bd46d73347c45874c3dab8044538214094548f65b4
Files
-
6a29b2dc88e49af317c1a5bd46d73347c45874c3dab8044538214094548f65b4.exe windows:6 windows x86 arch:x86
aacd87859408bc7aaf56c42dd8725fc9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DefWindowProcA
GetMessageA
RegisterClassExW
CreateWindowExW
DestroyWindow
DispatchMessageA
TranslateMessage
PostQuitMessage
LoadStringW
ShowWindow
DialogBoxParamA
EndDialog
CharUpperW
LoadAcceleratorsA
TranslateAcceleratorA
UpdateWindow
BeginPaint
LoadCursorA
LoadIconA
EndPaint
advapi32
RegOpenKeyExW
RegCloseKey
GetUserNameW
RegQueryInfoKeyA
ntdll
RtlInitUnicodeString
NtCreateFile
RtlUnwind
wininet
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
InternetReadFile
netapi32
NetApiBufferFree
NetGetJoinInformation
winhttp
WinHttpOpen
WinHttpSendRequest
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpConnect
WinHttpReceiveResponse
kernel32
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
OutputDebugStringW
HeapReAlloc
SetConsoleCtrlHandler
GetTimeZoneInformation
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
SetStdHandle
HeapSize
WriteConsoleW
IsValidCodePage
MoveFileExW
GetConsoleOutputCP
FlushFileBuffers
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
VirtualProtect
IsThreadAFiber
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
GetCurrentThread
CreateFileW
FindFirstFileW
CloseHandle
GetLastError
HeapAlloc
GetProcessHeap
DeviceIoControl
CreateProcessA
OpenProcess
GlobalMemoryStatusEx
GetSystemInfo
GetModuleFileNameW
GetComputerNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32EnumProcesses
K32EnumProcessModules
K32GetModuleFileNameExW
LocalFree
FormatMessageA
GetLocaleInfoEx
QueryPerformanceCounter
QueryPerformanceFrequency
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TryAcquireSRWLockExclusive
TryAcquireSRWLockShared
Sleep
WideCharToMultiByte
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
GetFullPathNameW
SetFileAttributesW
SetFileInformationByHandle
SetFileTime
GetTempPathW
AreFileApisANSI
GetModuleHandleW
GetProcAddress
CreateDirectoryExW
CopyFileW
SetEndOfFile
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
WakeAllConditionVariable
SleepConditionVariableSRW
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
WriteFile
GetStdHandle
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
Sections
.text Size: 854KB - Virtual size: 854KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fptable Size: 512B - Virtual size: 409B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ