D:\Work\Will\FPG\Src\CPA\Pack\Setup\SPH_123.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0677063f802df44d6ba8f3fc034d20f62e2e4d110d1decbb8c9413127c29ec29N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0677063f802df44d6ba8f3fc034d20f62e2e4d110d1decbb8c9413127c29ec29N.exe
Resource
win10v2004-20240802-en
General
-
Target
0677063f802df44d6ba8f3fc034d20f62e2e4d110d1decbb8c9413127c29ec29N
-
Size
895KB
-
MD5
600d542f852d10fed33e94f4b6c5a6d0
-
SHA1
675777a74e6b4dae86d49a0074c2a8ba8fd190ac
-
SHA256
0677063f802df44d6ba8f3fc034d20f62e2e4d110d1decbb8c9413127c29ec29
-
SHA512
bdeb361c03f941c80c9345ec3e0f1134ec8dc57c51e99590a66dd320a058ac2ec55da013b236ca403c9e0532e4f12ce49b0f776065102fde0cbc3864ab0deda1
-
SSDEEP
24576:dGaulLNypyELT52DShj2BK5jmTi2z5Or7U0iJv:dSJypyc52Ohj2+jOiu5OEZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0677063f802df44d6ba8f3fc034d20f62e2e4d110d1decbb8c9413127c29ec29N
Files
-
0677063f802df44d6ba8f3fc034d20f62e2e4d110d1decbb8c9413127c29ec29N.exe windows:5 windows x86 arch:x86
b5330105cd7e9f38aa41c57a6eb67a04
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LockResource
DeleteFileW
GetCommandLineW
GetVersionExW
lstrcatW
lstrcmpW
LoadResource
GetProcessHeap
SetEndOfFile
HeapReAlloc
GetStringTypeW
LCMapStringW
LoadLibraryW
HeapSize
SizeofResource
FindResourceW
GetTempPathW
GetModuleFileNameW
ReadFile
Sleep
FlushFileBuffers
SetStdHandle
WriteConsoleW
CreateFileW
GetSystemTimeAsFileTime
GetLastError
GetFileAttributesW
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
CloseHandle
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
user32
MessageBoxW
advapi32
RegEnumValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
shell32
ShellExecuteExW
ShellExecuteW
SHGetSpecialFolderPathW
Sections
.text Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ