rebornlauncher_scuffed.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d901606cdfc55b07f32e42465ce88178482569fbf63d5a960dfbfde6819ad983N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d901606cdfc55b07f32e42465ce88178482569fbf63d5a960dfbfde6819ad983N.exe
Resource
win10v2004-20240802-en
General
-
Target
d901606cdfc55b07f32e42465ce88178482569fbf63d5a960dfbfde6819ad983N
-
Size
1.9MB
-
MD5
6de541faef0e7b2896f35532583dd0a0
-
SHA1
1e9f717621d87e9b74edae6d0740c712dfec1576
-
SHA256
d901606cdfc55b07f32e42465ce88178482569fbf63d5a960dfbfde6819ad983
-
SHA512
721176f80fd81eeee3039ba405e162fde3f00cc3defe66ca280e69325c76742a08231b122ff3f7e73f449204a3a4f9ff4d88087f09b5021ee6a83f88c5e811e9
-
SSDEEP
24576:fgta+7EmrJ+J2oJBBDPhHJCXK0sd1HK7EfuWLtsI8IzKuL29dJ:fgtcmroJ2oJfbRJn91qIfVhsI8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d901606cdfc55b07f32e42465ce88178482569fbf63d5a960dfbfde6819ad983N
Files
-
d901606cdfc55b07f32e42465ce88178482569fbf63d5a960dfbfde6819ad983N.exe windows:6 windows x64 arch:x64
536b95a1f6f824bdb2bdcad401fbbd0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
bcryptprimitives
ProcessPrng
api-ms-win-core-synch-l1-2-0
WakeByAddressAll
WaitOnAddress
WakeByAddressSingle
ntdll
RtlUnwindEx
RtlPcToFileHeader
NtQuerySystemInformation
RtlGetVersion
NtQueryInformationProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlNtStatusToDosError
NtReadFile
NtWriteFile
advapi32
IsValidSid
GetLengthSid
CopySid
LookupAccountSidW
GetTokenInformation
OpenProcessToken
iphlpapi
FreeMibTable
GetIfEntry2
GetIfTable2
GetAdaptersAddresses
kernel32
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
HeapSize
GetConsoleOutputCP
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
ReadFileEx
VirtualAllocEx
VirtualFreeEx
GetSystemInfo
ReadProcessMemory
WriteProcessMemory
GetCurrentProcess
TerminateProcess
OpenProcess
GetSystemWow64DirectoryW
GetExitCodeProcess
GetProcessId
IsWow64Process
WaitForSingleObject
GetExitCodeThread
CreateRemoteThread
GetSystemWow64DirectoryA
DuplicateHandle
GetModuleHandleW
GetModuleFileNameW
GetProcAddress
VirtualQueryEx
GetFileInformationByHandle
CloseHandle
GetConsoleMode
GetCurrentProcessId
GetLastError
LocalFree
GetTickCount64
GlobalMemoryStatusEx
GetProcessHeap
HeapAlloc
HeapFree
GetProcessTimes
GetSystemTimes
GetProcessIoCounters
GetDiskFreeSpaceExW
CreateFileW
GetLogicalDrives
GetDriveTypeW
GetVolumeInformationW
DeviceIoControl
FreeEnvironmentStringsW
DeleteProcThreadAttributeList
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetCurrentThread
CreateWaitableTimerExW
SetWaitableTimer
Sleep
QueryPerformanceCounter
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCommandLineW
FlushFileBuffers
SetFileInformationByHandle
SetFilePointerEx
GetStdHandle
WriteFileEx
SleepEx
QueryPerformanceFrequency
GetSystemTimePreciseAsFileTime
HeapReAlloc
lstrlenW
ReleaseMutex
FindNextFileW
FindClose
GetFileInformationByHandleEx
FindFirstFileW
DeleteFileW
GetFileType
FormatMessageW
ExitProcess
CreateNamedPipeW
DeleteCriticalSection
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
ReadConsoleW
CreateThread
GetFullPathNameW
GetModuleHandleA
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
LeaveCriticalSection
EnterCriticalSection
EncodePointer
RaiseException
GetStringTypeW
SetStdHandle
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
WriteFile
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
FreeLibrary
LoadLibraryExW
TlsFree
netapi32
NetUserGetLocalGroups
NetUserEnum
NetUserGetInfo
NetApiBufferFree
ole32
CoInitializeEx
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitializeSecurity
oleaut32
SysFreeString
VariantClear
SysAllocString
pdh
PdhOpenQueryA
PdhGetFormattedCounterValue
PdhCloseQuery
PdhRemoveCounter
PdhAddEnglishCounterW
PdhCollectQueryData
powrprof
CallNtPowerInformation
psapi
EnumProcessModulesEx
GetModuleFileNameExW
GetModuleBaseNameW
GetPerformanceInfo
secur32
LsaGetLogonSessionData
LsaEnumerateLogonSessions
LsaFreeReturnBuffer
shell32
CommandLineToArgvW
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 585KB - Virtual size: 584KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ