d:\work\DDC\DDC\output\demo\DyndiskConverter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2a0170edc6a115d91f777fce4fae4cf0c894a5594d4104ce62e0778da1edaf62N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2a0170edc6a115d91f777fce4fae4cf0c894a5594d4104ce62e0778da1edaf62N.exe
Resource
win10v2004-20240802-en
General
-
Target
2a0170edc6a115d91f777fce4fae4cf0c894a5594d4104ce62e0778da1edaf62N
-
Size
2.5MB
-
MD5
02b776f2e68bfb2cf87bc89e2eace800
-
SHA1
14488cef8e738d8496b0f2c49047c68b14b11ed4
-
SHA256
2a0170edc6a115d91f777fce4fae4cf0c894a5594d4104ce62e0778da1edaf62
-
SHA512
4bfbf9ff09dd98848d8a1f255b1962b1162e5c84e742d3273bda0259427ec5b0e8b5e4f899751d49f8292326db76c6ffa15c080c05305b6ff0199dc5143d00a3
-
SSDEEP
49152:f6qR40ICoM4u/B/xoLP5BcLNiXicJFFRGNzj3:R4Y6B67wRGpj3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a0170edc6a115d91f777fce4fae4cf0c894a5594d4104ce62e0778da1edaf62N
Files
-
2a0170edc6a115d91f777fce4fae4cf0c894a5594d4104ce62e0778da1edaf62N.exe windows:4 windows x86 arch:x86
1cd6b4f580211cd6a10938dc1dbf4d59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
wcsncmp
ZwQueryDirectoryObject
ZwOpenSymbolicLinkObject
ZwOpenDirectoryObject
ZwQuerySymbolicLinkObject
mbstowcs
NtLoadDriver
ZwQueryVolumeInformationFile
NtUnloadDriver
_wcslwr
ZwCreateFile
RtlNtStatusToDosError
ZwOpenFile
ZwClose
ZwSetInformationFile
memset
strrchr
_chkstk
RtlInitUnicodeString
strncmp
strstr
vsprintf
wcschr
wcstoul
wcsncpy
_wcsnicmp
wcsstr
atoi
_wcsicmp
_wtoi
wcstombs
strncpy
_allshl
sprintf
memcpy
_aulldiv
_alldiv
_allrem
_allmul
wcsrchr
upgradeshow
PAGetGlobalDataObject
mfc80u
ord709
ord1079
ord3198
ord1386
ord4347
ord3327
ord3824
ord4475
ord1049
ord2832
ord1096
ord5562
ord334
ord5209
ord593
ord5226
ord5113
ord4562
ord3942
ord5222
ord5220
ord2925
ord2239
ord1911
ord3826
ord5378
ord6215
ord5096
ord1007
ord3800
ord5579
ord2009
ord2054
ord4320
ord6274
ord3795
ord6272
ord4008
ord4032
ord4535
ord3677
ord2261
ord566
ord757
ord2365
ord899
ord896
ord1058
ord1784
ord5987
ord6232
ord1577
ord280
ord715
ord1883
ord1634
ord1572
ord3286
ord2155
ord3755
ord3435
ord3990
ord730
ord772
ord774
ord2460
ord860
ord3355
ord501
ord5791
ord5398
ord3298
ord894
ord2121
ord5609
ord4119
ord3570
ord502
ord6700
ord282
ord3756
ord1479
ord2340
ord6282
ord1172
ord5316
ord6293
ord5327
ord1571
ord266
ord265
ord1156
ord3331
ord3249
ord2361
ord6061
ord6278
ord3296
ord444
ord677
ord4112
ord998
ord2264
ord3395
ord1006
ord2260
ord5485
ord2713
ord1416
ord1472
ord563
ord1939
ord753
ord530
ord722
ord557
ord745
ord6001
ord6002
ord5710
ord4101
ord5711
ord4100
ord3467
ord642
ord4230
ord1549
ord1628
ord2081
ord5981
ord5982
ord5618
ord4882
ord3590
ord3417
ord2386
ord2409
ord6063
ord2397
ord2379
ord2381
ord776
ord4574
ord2399
ord2159
ord2169
ord2163
ord2011
ord764
ord4098
ord5829
ord2651
ord3176
ord6086
ord2461
ord326
ord1536
ord2255
ord4226
ord3174
ord6058
ord3158
ord5633
ord1894
ord1270
ord2648
ord762
ord2366
ord3995
ord5637
ord4117
ord3281
ord3155
ord4109
ord587
ord602
ord347
ord5638
ord2521
ord5607
ord3678
ord6056
ord5604
ord6050
ord2362
ord4155
ord5636
ord6053
ord2077
ord5884
ord6033
ord5723
ord5643
ord5519
ord5584
ord5410
ord5397
ord5917
ord5715
ord1513
ord6273
ord3796
ord6275
ord3339
ord4961
ord1353
ord5171
ord3635
ord5178
ord1955
ord577
ord4206
ord1647
ord3157
ord4729
ord1646
ord4884
ord1590
ord1785
ord1662
ord5196
ord1661
ord2531
ord1542
ord2725
ord2829
ord4301
ord283
ord1271
ord6720
ord2708
ord5908
ord2856
ord1611
ord2534
ord741
ord3204
ord1608
ord2640
ord3940
ord2527
ord1392
ord3712
ord572
ord4238
ord3713
ord760
ord5148
ord3703
ord1899
ord2638
ord1925
ord5067
ord3943
ord6271
ord4480
ord4179
ord4256
ord5199
ord293
ord2311
ord3397
ord3311
ord4716
ord4276
ord1591
ord5956
ord4255
ord5231
ord2985
ord1118
ord5229
ord5210
ord920
ord4234
ord925
ord1393
ord929
ord5911
ord927
ord6721
ord931
ord1582
ord2384
ord2086
ord2404
ord2388
ord605
ord2394
ord354
ord2392
ord5727
ord2390
ord4314
ord2407
ord2402
ord5989
ord1198
ord1176
msvcr80
__p__fmode
__p__commode
_encode_pointer
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
vsprintf_s
rand
srand
vswprintf_s
_vscwprintf
_CxxThrowException
wcscat_s
_itow
_vsnwprintf
malloc
_vsnprintf
_strlwr
_wassert
wcsncpy_s
_purecall
memmove_s
wcscpy_s
memcpy_s
calloc
free
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@XZ
_swprintf
_invalid_parameter_noinfo
_vswprintf
sprintf_s
_beginthreadex
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_adjust_fdiv
__CxxFrameHandler3
_vscprintf
kernel32
MultiByteToWideChar
SetVolumeMountPointW
GetSystemWindowsDirectoryW
DeleteVolumeMountPointW
Sleep
SetLastError
GetVolumeNameForVolumeMountPointW
GetLocalTime
CreateDirectoryA
FlushFileBuffers
GetVersionExA
OutputDebugStringA
CreateFileA
GetSystemWindowsDirectoryA
GlobalMemoryStatusEx
lstrcpyW
WideCharToMultiByte
lstrlenW
WinExec
FreeLibrary
CreateMutexW
GetVersionExW
GetVersion
GetWindowsDirectoryW
GetPrivateProfileStringA
GetCurrentThread
GetModuleFileNameA
LocalFree
GetLogicalDrives
DeviceIoControl
ReadFile
SetFilePointer
WriteFile
LoadResource
FindResourceW
GetModuleHandleW
SizeofResource
LockResource
GetTickCount
GetFileAttributesW
ReleaseMutex
CreateProcessA
TerminateProcess
WaitForSingleObject
GetLastError
CloseHandle
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileW
GetModuleFileNameW
SetUnhandledExceptionFilter
GetProcAddress
LoadLibraryW
GetVolumeInformationW
SetVolumeLabelW
GetFileSizeEx
FindClose
FindFirstFileW
CreateDirectoryW
FindNextFileW
GetDiskFreeSpaceExW
SetFileAttributesW
CopyFileW
SystemTimeToFileTime
WritePrivateProfileStringA
DeleteFileW
GetPrivateProfileStringW
SetFilePointerEx
RemoveDirectoryW
IsBadWritePtr
IsBadReadPtr
GetComputerNameW
WritePrivateProfileStringW
GetPrivateProfileIntW
lstrlenA
GetFileSize
GetSystemTime
FindResourceExW
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
InitializeCriticalSection
user32
SetWindowLongW
IsWindowVisible
LoadCursorW
SetCursor
RedrawWindow
CopyIcon
PtInRect
GetSysColor
DestroyCursor
UnregisterClassA
GetFocus
PostMessageW
wsprintfW
IsWindow
GetIconInfo
GetAsyncKeyState
DrawIconEx
SetWindowRgn
WindowFromPoint
GetCursorPos
ReleaseDC
GetDC
ExitWindowsEx
FrameRect
GetWindowRect
LoadBitmapW
LoadIconW
DrawIcon
IsIconic
AppendMenuW
GetSystemMenu
TranslateMessage
PeekMessageW
UpdateWindow
MessageBoxW
DispatchMessageW
KillTimer
SetTimer
SetForegroundWindow
GetClientRect
GetWindowTextW
InvalidateRect
GrayStringW
DrawTextExW
GetParent
DrawTextW
SendMessageW
FillRect
TabbedTextOutW
SetRect
DrawStateW
GetSystemMetrics
InflateRect
EnableWindow
gdi32
SetBkColor
SetBkMode
SetTextColor
GetTextMetricsW
DeleteDC
GetCurrentObject
SetTextJustification
LineTo
MoveToEx
DeleteObject
FrameRgn
FillRgn
CombineRgn
CreateRectRgn
CreatePolygonRgn
CreateRoundRectRgn
GetDeviceCaps
CreateFontIndirectW
Rectangle
GetObjectW
GetStockObject
CreateFontW
RoundRect
DPtoLP
Escape
CreateCompatibleBitmap
LPtoDP
CreateCompatibleDC
SelectObject
ExtTextOutW
TextOutW
RectVisible
GetTextExtentPoint32W
PtVisible
CreatePen
BitBlt
GetBkColor
CreateSolidBrush
CreateRectRgnIndirect
advapi32
ConvertStringSidToSidW
RegDeleteKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
BuildExplicitAccessWithNameW
SetNamedSecurityInfoW
SetEntriesInAclW
RegSetKeySecurity
RegEnumKeyExW
RegFlushKey
RegUnLoadKeyW
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegGetKeySecurity
RegLoadKeyW
ConvertSecurityDescriptorToStringSecurityDescriptorW
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyA
RegQueryValueExA
RegQueryValueW
EqualSid
GetTokenInformation
FreeSid
OpenProcessToken
OpenThreadToken
AllocateAndInitializeSid
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyW
shell32
SHGetFolderPathW
ShellExecuteW
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
PathFileExistsW
ole32
CoUninitialize
CoInitialize
msvcp80
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
?insert@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@IPB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
?find_last_of@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEIPB_WI@Z
?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?npos@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@2IB
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?swap@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXAAV12@@Z
?find@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEIPB_WI@Z
?resize@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXI@Z
?clear@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXXZ
?deallocate@?$allocator@_W@std@@QAEXPA_WI@Z
?allocate@?$allocator@_W@std@@QAEPA_WI@Z
winhttp
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpOpenRequest
WinHttpQueryHeaders
WinHttpAddRequestHeaders
WinHttpSetOption
WinHttpWriteData
WinHttpConnect
WinHttpCloseHandle
WinHttpOpen
rpcrt4
UuidCreate
Exports
Exports
GetObjGAHelp
GetObjGATrackingData
GetObjGoogleAnalytics
Sections
.text Size: 460KB - Virtual size: 457KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 528KB - Virtual size: 524KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE