b:\source\source.IC\54328\Release_WDEXE_82\WX\Win32\Release\WDExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5d7a9e8dc4e944bc6be76408bd15977c25938d9530f6921b7e13a169a247b199N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5d7a9e8dc4e944bc6be76408bd15977c25938d9530f6921b7e13a169a247b199N.exe
Resource
win10v2004-20240802-en
General
-
Target
5d7a9e8dc4e944bc6be76408bd15977c25938d9530f6921b7e13a169a247b199N
-
Size
914KB
-
MD5
9dee0a2a69385a4e3ce0bb45f3cf22c0
-
SHA1
4c72e7ec0cf130ff9d51bde2107f2fd83233885d
-
SHA256
5d7a9e8dc4e944bc6be76408bd15977c25938d9530f6921b7e13a169a247b199
-
SHA512
c83babc9e8aadf17c7bb9d02558aff580771c328edab10cd8808c776d0179592f64477b4e6f1c10856ef8cc2418ffc4138e76cc8dd11db88b0463eaf4c2239be
-
SSDEEP
24576:Ph81wJr77Oj3ROpCYxKwlh0avCmS5b/XtpXj+PY:nd77OwxK2vCmm/XDcY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d7a9e8dc4e944bc6be76408bd15977c25938d9530f6921b7e13a169a247b199N
Files
-
5d7a9e8dc4e944bc6be76408bd15977c25938d9530f6921b7e13a169a247b199N.exe windows:4 windows x86 arch:x86
39e2182713656be0dc08924cb10b3298
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
_except_handler3
_onexit
__dllonexit
_lfind
vsprintf
memcmp
iswspace
_vsnprintf
strchr
realloc
towupper
wcspbrk
_wmakepath
_wstati64
_wcsupr
strcat
memmove
wcschr
atoi
strlen
wcsstr
vswprintf
wcscmp
_vsnwprintf
_wcsnicmp
swprintf
_wtoi
_purecall
strncmp
memcpy
_wcsicmp
gmtime
time
free
malloc
memset
wcsrchr
wcsncpy
wcscpy
wcslen
wcscat
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
kernel32
ReleaseMutex
RaiseException
InterlockedExchange
GetSystemDefaultLangID
CreateThread
TerminateThread
ResumeThread
CreateProcessW
ReleaseSemaphore
CreateSemaphoreW
LoadLibraryA
WideCharToMultiByte
InterlockedDecrement
GetCurrentThreadId
TlsFree
TlsAlloc
VirtualProtect
VirtualQuery
TlsGetValue
TlsSetValue
GetDriveTypeW
GetFullPathNameW
FindNextFileW
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
CreateDirectoryW
CopyFileW
MoveFileW
DeleteFileW
CreateFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
SetLastError
SetErrorMode
SetEndOfFile
FlushFileBuffers
UnlockFileEx
UnlockFile
LockFileEx
LockFile
SetFilePointer
WriteFile
GetVolumeInformationW
GetLogicalDriveStringsW
GetFileInformationByHandle
LoadLibraryW
GetVersionExW
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchangeAdd
InterlockedIncrement
WritePrivateProfileStringW
CreateMailslotW
ExpandEnvironmentStringsW
GetLocalTime
GetComputerNameW
GetProfileStringW
ReadFile
GetExitCodeProcess
GetMailslotInfo
Sleep
GetPrivateProfileStringW
GetPrivateProfileIntW
GetModuleFileNameW
GetLastError
CreateFileMappingW
CloseHandle
MapViewOfFile
UnmapViewOfFile
GetVersionExA
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
CreateEventW
GetStartupInfoW
MulDiv
SetEvent
CreateMutexW
WaitForSingleObject
OpenFileMappingW
FreeLibrary
FindResourceW
LoadResource
LockResource
FreeResource
GetTempPathW
GetTempFileNameW
GetCurrentProcessId
FormatMessageW
LocalFree
GetCommandLineW
ExitProcess
Exports
Exports
CommandeComposante
DeclareProxy
Execution
LibereMutex
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ