c:\DesktopX2\AppLauncher\Release\AppLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9c7d971dad83d6f99b987b265c669ae1fb2d23d843622716e2b7c40a85ea84df.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9c7d971dad83d6f99b987b265c669ae1fb2d23d843622716e2b7c40a85ea84df.exe
Resource
win10v2004-20240802-en
General
-
Target
9c7d971dad83d6f99b987b265c669ae1fb2d23d843622716e2b7c40a85ea84df
-
Size
813KB
-
MD5
0f1b431212600e62869a7e8e241fe22e
-
SHA1
ece27e0255c0a6165ce851d621b3c009b7b15a52
-
SHA256
9c7d971dad83d6f99b987b265c669ae1fb2d23d843622716e2b7c40a85ea84df
-
SHA512
da88ce627b3a6bb2ae38b12767b05d51565c28d6f69960266c7ccd3d9415bb507f61b4727353e7b4c0eef5ef36c39fea85e7944797d48d22095c1edefb6691da
-
SSDEEP
12288:kLxrFRn+oWo89PIjx8HqOJe5ZVkUHbU6Qhu5LexC4Utp9qPgjDkT3xX9959b99/B:MxrFBeo8U8HqOMaubR4u5C94NW3xSS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9c7d971dad83d6f99b987b265c669ae1fb2d23d843622716e2b7c40a85ea84df
Files
-
9c7d971dad83d6f99b987b265c669ae1fb2d23d843622716e2b7c40a85ea84df.exe windows:4 windows x86 arch:x86
d782c0610fff025c8d2e42d79fae94f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
PathIsDirectoryW
PathGetArgsW
PathStripPathW
kernel32
GetSystemInfo
MultiByteToWideChar
lstrlenA
CreateDirectoryW
lstrcpyW
lstrlenW
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
CreateFileW
lstrcpynW
DeleteFileW
WriteFile
LockResource
LoadResource
SizeofResource
GetTempFileNameW
GetTempPathW
RemoveDirectoryW
FindClose
lstrcmpW
FindNextFileW
FindFirstFileW
SetLastError
Sleep
GetSystemDirectoryW
MoveFileW
lstrcatW
GetModuleFileNameW
GetCommandLineW
VirtualProtect
GetLocaleInfoA
FindResourceW
HeapCreate
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapDestroy
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
ReadFile
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
SetStdHandle
FlushFileBuffers
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
SetEndOfFile
user32
DispatchMessageW
KillTimer
PostQuitMessage
wsprintfW
SetTimer
TranslateMessage
GetMessageW
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
shell32
ShellExecuteExW
ole32
CoCreateGuid
StringFromGUID2
Sections
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 748KB - Virtual size: 747KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ