D:\Projects\MultiCommander\BuildOutput\Output\x64\Release v143\MCAdmin\MCAdmin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
698f1f3a1adc6e70b2e6e65f791dc5d936a06bdd030c11b8662656fd5fa08464N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
698f1f3a1adc6e70b2e6e65f791dc5d936a06bdd030c11b8662656fd5fa08464N.exe
Resource
win10v2004-20240802-en
General
-
Target
698f1f3a1adc6e70b2e6e65f791dc5d936a06bdd030c11b8662656fd5fa08464N.exe
-
Size
340KB
-
MD5
09405251bb1ba88238bfb755a8896170
-
SHA1
f69b99a0e2770aa6220695afc30bf9829a0924e3
-
SHA256
698f1f3a1adc6e70b2e6e65f791dc5d936a06bdd030c11b8662656fd5fa08464
-
SHA512
ebdd8238eb6671dc1a61930b65ce05ab0c0da635dcc60f192b7de6a4a828d65c49202e8a3bac2151e0f2d00c314e76648287cc6fa2852f3b25aea46721e30429
-
SSDEEP
6144:ucx+r9yg4GSFCDi5ENyJCbZeJAo7Gj9NWFr7Rgh0wrG:uc49B4xFCDiWNyJCbiAB9NWFBgh0w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 698f1f3a1adc6e70b2e6e65f791dc5d936a06bdd030c11b8662656fd5fa08464N.exe
Files
-
698f1f3a1adc6e70b2e6e65f791dc5d936a06bdd030c11b8662656fd5fa08464N.exe.exe windows:6 windows x64 arch:x64
e5b061114d2ee314f74f3bafd65e3bc2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
CreateEventW
CreateFileW
OpenFileMappingW
MapViewOfFile
CreateFileMappingW
FlushViewOfFile
UnmapViewOfFile
GetCurrentThreadId
IsBadWritePtr
IsBadReadPtr
ReleaseMutex
CreateMutexW
OpenMutexW
OpenEventW
LoadLibraryExW
DisableThreadLibraryCalls
InitializeCriticalSectionEx
InitializeCriticalSection
GetModuleHandleW
lstrcmpiW
GetModuleFileNameW
RaiseException
DecodePointer
VerifyVersionInfoW
VerSetConditionMask
SetLastError
MoveFileExW
SetFileTime
DeleteFileW
CreateDirectoryW
RemoveDirectoryW
SetFileAttributesW
DebugBreak
WriteFile
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetStringTypeW
LeaveCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
LCMapStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
VirtualQuery
VirtualProtect
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlPcToFileHeader
EnterCriticalSection
DeleteCriticalSection
HeapDestroy
SwitchToThread
Sleep
GetTickCount
MultiByteToWideChar
GetWindowsDirectoryW
GetSystemDirectoryW
FindResourceExW
FindResourceW
SetEvent
LoadResource
LockResource
SizeofResource
QueryDosDeviceW
TerminateThread
WaitForSingleObject
GetCurrentProcessId
OpenProcess
DuplicateHandle
FreeLibrary
GetProcAddress
LoadLibraryW
CloseHandle
GetCurrentThread
GetCurrentProcess
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
SetStdHandle
RtlUnwindEx
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
VirtualAlloc
VirtualFree
LoadLibraryExA
RtlUnwind
user32
KillTimer
RedrawWindow
UnregisterClassW
SetTimer
MessageBoxW
PostMessageW
CallWindowProcW
GetWindowLongPtrW
SetWindowLongPtrW
GetMonitorInfoW
MonitorFromPoint
GetWindowRect
InvalidateRect
CreatePopupMenu
DestroyMenu
TrackPopupMenuEx
AppendMenuW
GetMenuItemCount
RemoveMenu
GetMenuItemInfoW
CreateWindowExW
SetWindowPos
MessageBeep
IsWindow
PtInRect
PeekMessageW
MapWindowPoints
DefWindowProcW
LoadCursorW
GetClassInfoExW
LoadImageW
GetSystemMetrics
RegisterClassExW
DrawTextW
LoadAcceleratorsW
LoadMenuW
SendMessageW
SetFocus
GetWindowLongW
PostQuitMessage
LoadStringA
LoadStringW
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
SetWindowTextW
UpdateWindow
ShowWindow
CharNextW
GetClientRect
EndPaint
BeginPaint
gdi32
DeleteObject
SaveDC
RestoreDC
GetStockObject
SetBkMode
SetTextColor
SelectObject
GetClipBox
CreateSolidBrush
PatBlt
advapi32
QueryServiceStatus
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
EnumDependentServicesW
LookupPrivilegeValueW
ControlService
EnumServicesStatusExW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
OpenThreadToken
OpenProcessToken
PrivilegeCheck
AdjustTokenPrivileges
shell32
SHFileOperationW
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
shlwapi
SHDeleteKeyW
SHCopyKeyW
userenv
UnloadUserProfile
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ