C:\Users\win10\AppData\Local\Temp\Y\TM\debug\win32\debuger\TM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
366b7c98c9e9dd131f3ac2a57e10e19869dd4e3a95d9a01326f59cf1aa075fbe.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
366b7c98c9e9dd131f3ac2a57e10e19869dd4e3a95d9a01326f59cf1aa075fbe.exe
Resource
win10v2004-20240802-en
General
-
Target
366b7c98c9e9dd131f3ac2a57e10e19869dd4e3a95d9a01326f59cf1aa075fbe
-
Size
4.2MB
-
MD5
5b29dd785840c18891dd85a98ef4a3b4
-
SHA1
a2b34332acb8ec1b9d1de7554f09ac05a6ba6566
-
SHA256
366b7c98c9e9dd131f3ac2a57e10e19869dd4e3a95d9a01326f59cf1aa075fbe
-
SHA512
d3560fe07c1b9ec593ff521d7aa0b7ff9a2a3a55c0f105d6312de917e3127ccfcc439c291fc11585dc341dcc8660019bf39938b6acf571e58749fb2db86732d5
-
SSDEEP
49152:RPtsehYNaEJEidXa6QSYeWQMnXGrvphiA1JdD9SQHkACOSE8EObkxapGsUs9ocS3:w7WhRPjgvDDMQHkOSEjT9s9o366
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 366b7c98c9e9dd131f3ac2a57e10e19869dd4e3a95d9a01326f59cf1aa075fbe
Files
-
366b7c98c9e9dd131f3ac2a57e10e19869dd4e3a95d9a01326f59cf1aa075fbe.exe windows:6 windows x86 arch:x86
293c3e06a190dba37914e7457e9e01bf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LockResource
SizeofResource
FindResourceW
FreeLibrary
GetProcAddress
LoadLibraryW
GetUserDefaultLCID
GetCommandLineW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
ReadFile
RemoveDirectoryW
GetLastError
SetLastError
CreatePipe
PeekNamedPipe
WaitForSingleObject
GetCurrentProcess
GetExitCodeProcess
CreateProcessW
GetSystemInfo
GetVersionExW
VirtualQuery
GetModuleHandleW
GlobalFlags
LocalFree
FormatMessageW
CopyFileW
IsBadReadPtr
IsBadWritePtr
SetSystemPowerState
MultiByteToWideChar
WideCharToMultiByte
GenerateConsoleCtrlEvent
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
GetQueuedCompletionStatus
SetEvent
ResetEvent
CreateThread
SetThreadPriority
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
SetLocalTime
FileTimeToSystemTime
FreeResource
FlushFileBuffers
HeapQueryInformation
HeapSize
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
DecodePointer
GetFileSizeEx
GetConsoleOutputCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetCurrentThread
SetConsoleCtrlHandler
HeapValidate
GetCommandLineA
WriteConsoleW
GetModuleHandleExW
GetFileType
GetStdHandle
EncodePointer
InterlockedFlushSList
InterlockedPushEntrySList
LoadLibraryExW
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
RaiseException
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetTickCount
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSection
DebugBreak
MulDiv
CreateFileW
GlobalFree
GlobalLock
GlobalUnlock
GlobalSize
GlobalReAlloc
GlobalAlloc
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringW
GetProcessHandleCount
OpenProcess
TerminateProcess
GetCurrentProcessId
LoadResource
GetLocalTime
WriteFile
IsDebuggerPresent
CreateEventW
GetModuleFileNameW
GetWindowsDirectoryW
GetSystemDirectoryW
GetTempPathW
ExitProcess
IsBadStringPtrW
SwitchToThread
InitializeCriticalSectionAndSpinCount
IsBadStringPtrA
Sleep
CloseHandle
lstrcpynW
SetEndOfFile
user32
EnumChildWindows
GetClassNameW
MessageBoxW
GetMessageW
TranslateMessage
GetDC
GetWindowDC
ReleaseDC
GetClientRect
GetWindowRect
LoadStringW
SendMessageW
DefWindowProcW
RegisterClassW
DispatchMessageW
CreateWindowExW
DestroyWindow
GetActiveWindow
SetTimer
SetPropW
GetPropW
RemovePropW
GetSystemMetrics
GetWindowLongW
GetDesktopWindow
GetParent
LoadCursorW
LoadIconW
LoadImageW
CopyImage
ExitWindowsEx
GetClassInfoW
PostMessageW
AttachThreadInput
wsprintfW
GetKeyState
GetMonitorInfoW
MonitorFromWindow
EnumDisplaySettingsW
GetWindowThreadProcessId
EnumWindows
SetForegroundWindow
SetActiveWindow
EmptyClipboard
GetClipboardData
SetClipboardData
CloseClipboard
OpenClipboard
MoveWindow
WaitForInputIdle
gdi32
GetTextExtentPoint32W
CreateFontIndirectW
GetObjectW
SetDIBColorTable
CreateDIBSection
GdiAlphaBlend
SetStretchBltMode
StretchBlt
SelectPalette
SelectObject
RealizePalette
GetSystemPaletteEntries
GetStockObject
GetDIBits
DeleteObject
DeleteDC
CreatePalette
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
GetDeviceCaps
advapi32
RegQueryValueW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
OpenProcessToken
RegOpenKeyExW
shell32
ShellExecuteW
SHGetSpecialFolderPathW
DragAcceptFiles
ole32
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
OleRun
CLSIDFromProgID
IIDFromString
CLSIDFromString
CoInitializeEx
oleaut32
GetActiveObject
VariantTimeToSystemTime
SystemTimeToVariantTime
VarUdateFromDate
OleCreatePictureIndirect
SysAllocString
SysFreeString
SysStringLen
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
SafeArrayUnaccessData
VariantInit
VariantClear
VariantCopy
VariantCopyInd
VariantChangeType
VarCmp
LHashValOfNameSys
LoadTypeLi
RegisterTypeLi
OleCreateFontIndirect
comctl32
ImageList_AddMasked
ImageList_Destroy
ImageList_Create
gdiplus
GdipAlloc
GdipDrawImageRectI
GdipSetCompositingMode
GdipDeleteGraphics
GdipBitmapUnlockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromFile
GdipCreateBitmapFromStream
GdipGetImagePaletteSize
GdipGetImagePalette
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipFree
GdipBitmapLockBits
ws2_32
WSACleanup
WSAStartup
Exports
Exports
?get_active_implementation@simdutf@@YAAAV?$atomic_ptr@$$CBVimplementation@simdutf@@@internal@1@XZ
?get_available_implementations@simdutf@@YAABVavailable_implementation_list@internal@1@XZ
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 503KB - Virtual size: 502KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ