C:\BWA\YSUtilities-32\objroot\x64-Release\YSLoader\YSLoader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a9a9d646e76ff2fa9254aab8a541712dc7e1b6c0a1c2c59b205b54765026a1e4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a9a9d646e76ff2fa9254aab8a541712dc7e1b6c0a1c2c59b205b54765026a1e4N.exe
Resource
win10v2004-20240802-en
General
-
Target
a9a9d646e76ff2fa9254aab8a541712dc7e1b6c0a1c2c59b205b54765026a1e4N
-
Size
127KB
-
MD5
84ef2336e9a6e3106c5e95b1b77ce400
-
SHA1
7152890dc6932f9d18511c5ba097b0e98cc4db07
-
SHA256
a9a9d646e76ff2fa9254aab8a541712dc7e1b6c0a1c2c59b205b54765026a1e4
-
SHA512
f62c59381211ccc08dc685562d26054a51a4148671fbe598df1128b3aa266bcb06bc8e9127ac2a04dc2ad6cdaa1378a420183011b54ffd149692bba05e2afa94
-
SSDEEP
3072:P8fAJU39Sbm9/sPpIUSODyQflBZ4oiqofA7FR2PD1Wztr/Am:uAs9Sb6UPpmOD3lXgggur/Am
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9a9d646e76ff2fa9254aab8a541712dc7e1b6c0a1c2c59b205b54765026a1e4N
Files
-
a9a9d646e76ff2fa9254aab8a541712dc7e1b6c0a1c2c59b205b54765026a1e4N.exe windows:5 windows x64 arch:x64
f477606c9b59034e35773c07cb59264a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetProcAddress
GetLastError
LoadLibraryW
GetModuleFileNameW
SetDllDirectoryW
GetFileAttributesW
WideCharToMultiByte
FreeEnvironmentStringsW
lstrlenW
DebugBreak
GetCommandLineW
GetCurrentThreadId
GetCurrentProcessId
Process32Next
Process32First
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
CloseHandle
SetUnhandledExceptionFilter
OutputDebugStringA
SetLastError
GetEnvironmentStringsW
GetEnvironmentVariableW
LocalAlloc
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
FreeLibrary
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
MultiByteToWideChar
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
Sleep
DecodePointer
EncodePointer
LoadLibraryA
advapi32
RegCloseKey
RegCreateKeyW
RegOpenKeyExW
RegQueryValueExW
msvcp100
?_Xlength_error@std@@YAXPEBD@Z
?_Orphan_all@_Container_base0@std@@QEAAXXZ
?_Xout_of_range@std@@YAXPEBD@Z
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathFindExtensionW
msvcr100
_vswprintf
memmove
memset
wcschr
??2@YAPEAX_K@Z
?what@exception@std@@UEBAPEBDXZ
__C_specific_handler
_unlock
__dllonexit
_lock
_onexit
_amsg_exit
__getmainargs
_XcptFilter
_exit
_cexit
exit
__initenv
_initterm
_initterm_e
_configthreadlocale
_vscwprintf
_commode
_fmode
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
??_V@YAXPEAX@Z
_wgetenv
_wcsicmp
??3@YAXPEAX@Z
??0exception@std@@QEAA@XZ
??1exception@std@@UEAA@XZ
??0exception@std@@QEAA@AEBV01@@Z
_CxxThrowException
_errno
??0exception@std@@QEAA@AEBQEBD@Z
__CxxFrameHandler3
strcpy
strlen
malloc
free
wcslen
_vscprintf
__setusermatherr
memcpy
vsprintf
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 358B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ