C:\home\jenkins\agent\workspace\s_TANG_Software_TVSU_TVSU_master\tvsu\Output\tvsu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
030e22025649c921516b53407eed400fd66630d325b598f55f27cc48504420ae.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
030e22025649c921516b53407eed400fd66630d325b598f55f27cc48504420ae.exe
Resource
win10v2004-20240802-en
General
-
Target
030e22025649c921516b53407eed400fd66630d325b598f55f27cc48504420ae
-
Size
1.6MB
-
MD5
8f22b55f6d5a14b99cf4b54e0d3a1948
-
SHA1
40a71f069a97586adc07a13fab995bfb126257e2
-
SHA256
030e22025649c921516b53407eed400fd66630d325b598f55f27cc48504420ae
-
SHA512
e90e7991cb3ff4da296f000e54717197b07bc4477ecc70aab941169f79ad39eefa16b3ed40d6695733291ee03967a4d48c3b58d5ca6c3db2d975ee57f9e69ead
-
SSDEEP
24576:nP61J0Nx3cHWhK0xmZCJifh6GjyDkZRtyBQI/6LljRY:P6f0NxDs0Ioq6UbNjq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 030e22025649c921516b53407eed400fd66630d325b598f55f27cc48504420ae
Files
-
030e22025649c921516b53407eed400fd66630d325b598f55f27cc48504420ae.exe windows:6 windows x86 arch:x86
c1be558175a5def0c533ce6793a430b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalFree
LoadLibraryW
LoadResource
FindResourceW
GlobalLock
OpenMutexW
GlobalUnlock
MulDiv
SetUnhandledExceptionFilter
DecodePointer
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapReAlloc
HeapSize
SetFilePointerEx
Process32FirstW
GetProcessHeap
LCMapStringW
CompareStringW
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GlobalAlloc
Process32NextW
GetLastError
Sleep
CreateToolhelp32Snapshot
FreeResource
GetVersionExW
WaitForSingleObject
CreateMutexW
GetCurrentProcess
SizeofResource
GetCurrentProcessId
CreateFileW
WriteFile
FreeLibrary
GetProcAddress
CloseHandle
GetVersionExA
LoadLibraryA
OpenProcess
TerminateProcess
WriteConsoleW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
HeapAlloc
HeapFree
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
GetStdHandle
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
SetLastError
UnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
user32
GetDesktopWindow
PostQuitMessage
KillTimer
GetClientRect
ReleaseDC
FindWindowW
TranslateMessage
SetTimer
DispatchMessageW
UpdateWindow
BeginPaint
ShowWindow
EndPaint
SetWindowLongW
LoadStringW
GetMessageW
CreateDialogParamW
DestroyWindow
GetDC
SetWindowPos
MessageBoxW
SendMessageW
gdi32
GetDeviceCaps
advapi32
RegCloseKey
EqualSid
AllocateAndInitializeSid
OpenProcessToken
FreeSid
RegOpenKeyExW
RegGetValueW
GetUserNameW
LookupAccountSidW
RegQueryValueExW
GetTokenInformation
shell32
ShellExecuteExW
ole32
CreateStreamOnHGlobal
shlwapi
StrCmpW
gdiplus
GdiplusStartup
GdiplusShutdown
GdipLoadImageFromStream
GdipDeleteFont
GdipDeleteGraphics
GdipCloneBrush
GdipCreateFromHDC
GdipDrawString
GdipFree
GdipCreateSolidFill
GdipCreateFont
GdipDisposeImage
GdipDrawImageRectI
GdipAlloc
GdipDeleteBrush
GdipCloneImage
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
Exports
Exports
KillProcess
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 328KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE