E:\WindowsProject1\WindowsProject1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
635bd7297f3c14ada31fe79536f73b4aa1b12206eb2eac8574f34f82e31bb36aN.exe
Resource
win7-20240708-en
General
-
Target
635bd7297f3c14ada31fe79536f73b4aa1b12206eb2eac8574f34f82e31bb36aN
-
Size
1.0MB
-
MD5
ca5e57198a218a1a787403d160c2e750
-
SHA1
d7ad839713447493e2a3d8e42252ff3c17c812d6
-
SHA256
635bd7297f3c14ada31fe79536f73b4aa1b12206eb2eac8574f34f82e31bb36a
-
SHA512
d43691dd325a81132d366b1246b3bb1c7455e257f08a5d76669fddc378d0527ca74e67ee0c6388e2bd4c49fc7f28dbc54a870735588c85073fc2dfc359fe1e30
-
SSDEEP
12288:wAYM35ccLDRj4jSqOXqI6AwO+6ds1pJz6u0M+MVrO24CV+o:wOccLDRjdqOXqI6Ae6oJzN4MVrO24zo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 635bd7297f3c14ada31fe79536f73b4aa1b12206eb2eac8574f34f82e31bb36aN
Files
-
635bd7297f3c14ada31fe79536f73b4aa1b12206eb2eac8574f34f82e31bb36aN.exe windows:6 windows x86 arch:x86
aacd87859408bc7aaf56c42dd8725fc9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
DefWindowProcA
GetMessageA
RegisterClassExW
CreateWindowExW
DestroyWindow
DispatchMessageA
TranslateMessage
PostQuitMessage
LoadStringW
ShowWindow
DialogBoxParamA
EndDialog
CharUpperW
LoadAcceleratorsA
TranslateAcceleratorA
UpdateWindow
BeginPaint
LoadCursorA
LoadIconA
EndPaint
advapi32
RegOpenKeyExW
RegCloseKey
GetUserNameW
RegQueryInfoKeyA
ntdll
RtlInitUnicodeString
NtCreateFile
RtlUnwind
wininet
InternetOpenUrlW
InternetCloseHandle
InternetOpenW
InternetReadFile
netapi32
NetApiBufferFree
NetGetJoinInformation
winhttp
WinHttpOpen
WinHttpSendRequest
WinHttpOpenRequest
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpConnect
WinHttpReceiveResponse
kernel32
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
OutputDebugStringW
HeapReAlloc
SetConsoleCtrlHandler
GetTimeZoneInformation
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
ReadFile
GetConsoleMode
SetStdHandle
HeapSize
WriteConsoleW
IsValidCodePage
MoveFileExW
GetConsoleOutputCP
FlushFileBuffers
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
VirtualProtect
IsThreadAFiber
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
GetCurrentThread
CreateFileW
FindFirstFileW
CloseHandle
GetLastError
HeapAlloc
GetProcessHeap
DeviceIoControl
CreateProcessA
OpenProcess
GlobalMemoryStatusEx
GetSystemInfo
GetModuleFileNameW
GetComputerNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32EnumProcesses
K32EnumProcessModules
K32GetModuleFileNameExW
LocalFree
FormatMessageA
GetLocaleInfoEx
QueryPerformanceCounter
QueryPerformanceFrequency
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TryAcquireSRWLockExclusive
TryAcquireSRWLockShared
Sleep
WideCharToMultiByte
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileExW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
GetFullPathNameW
SetFileAttributesW
SetFileInformationByHandle
SetFileTime
GetTempPathW
AreFileApisANSI
GetModuleHandleW
GetProcAddress
CreateDirectoryExW
CopyFileW
SetEndOfFile
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
WakeAllConditionVariable
SleepConditionVariableSRW
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
WriteFile
GetStdHandle
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
Sections
.text Size: 854KB - Virtual size: 854KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fptable Size: 512B - Virtual size: 409B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ