C:\BuildAgent\work\4a73c29f3c4e6ac\downloader\Release\downloader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cc68358fa396ae8557dd3e580414f28d1823e886e38f072242ea6580bb5a8075N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc68358fa396ae8557dd3e580414f28d1823e886e38f072242ea6580bb5a8075N.exe
Resource
win10v2004-20240802-en
General
-
Target
cc68358fa396ae8557dd3e580414f28d1823e886e38f072242ea6580bb5a8075N
-
Size
225KB
-
MD5
a6a683d38eabbd981e04dc4785a0a590
-
SHA1
e614588cc7b74da164ea9f3da9309d93b2b0fd33
-
SHA256
cc68358fa396ae8557dd3e580414f28d1823e886e38f072242ea6580bb5a8075
-
SHA512
dfb94b0e03b0e16c5194852e43eda8617991cae0ec77cf96215ee05d18fbf0a21431839fe150882e2f2fa82c47e278d39e1908fd6d3165fac4797e6420e46dd5
-
SSDEEP
3072:E6GEtNEXN4wCq5/v46QC2mCm/lY9Kkj3c6QQaWAk0Ag5qAWKGETBKnF58it3kzMx:hGYk4wCq5x+9T3bQQaNlTwNt3kz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc68358fa396ae8557dd3e580414f28d1823e886e38f072242ea6580bb5a8075N
Files
-
cc68358fa396ae8557dd3e580414f28d1823e886e38f072242ea6580bb5a8075N.exe windows:5 windows x86 arch:x86
9d4745b4b8ed18dda7e4fbf0015900e0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
secur32
LsaGetLogonSessionData
LsaFreeReturnBuffer
LsaEnumerateLogonSessions
kernel32
WaitForSingleObject
GetVersionExW
Sleep
GetLastError
CloseHandle
GetCurrentProcessId
CreateProcessW
GetExitCodeProcess
GetModuleFileNameW
CreateFileW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
VirtualQuery
GetCurrentProcess
HeapFree
FindClose
DuplicateHandle
MultiByteToWideChar
OutputDebugStringW
HeapAlloc
GetProcessHeap
WideCharToMultiByte
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetCommandLineW
SetHandleInformation
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
ExitProcess
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
WriteFile
DecodePointer
ReadConsoleW
ReadFile
SetEndOfFile
HeapReAlloc
HeapSize
GetModuleHandleExW
GetStdHandle
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
WriteConsoleW
SetFilePointerEx
TlsAlloc
LCMapStringW
CompareStringW
GetFileType
GetStringTypeW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetACP
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EncodePointer
RtlUnwind
RaiseException
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
user32
CharLowerW
wsprintfW
advapi32
CopySid
ConvertSidToStringSidW
GetLengthSid
LsaNtStatusToWinError
OpenProcessToken
GetTokenInformation
shell32
ShellExecuteExW
SHCreateDirectoryExW
ole32
CoUninitialize
CoInitialize
oleaut32
VariantClear
urlmon
URLOpenBlockingStreamW
wintrust
WinVerifyTrust
ws2_32
WSAGetLastError
htons
htonl
connect
socket
send
WSAStartup
getaddrinfo
shutdown
closesocket
WSACleanup
freeaddrinfo
recv
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ