E:\zhanlue\rcimage\bin\Win32\Release\pdb\2345PicWorker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
84a8ec440d02b7a3fb645ae35f091011381771ca970193199c5a21b4ddc35e48.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84a8ec440d02b7a3fb645ae35f091011381771ca970193199c5a21b4ddc35e48.exe
Resource
win10v2004-20241007-en
General
-
Target
84a8ec440d02b7a3fb645ae35f091011381771ca970193199c5a21b4ddc35e48
-
Size
1.9MB
-
MD5
bdbca9517083fd720385e72552c8ad58
-
SHA1
ca8b0777e487c17c8f93a724273faba4bee57217
-
SHA256
84a8ec440d02b7a3fb645ae35f091011381771ca970193199c5a21b4ddc35e48
-
SHA512
c091b27188c85281947eb3a423bb4297ab850d89104b9d5e5d9d2ad761c31aa4115aa8e1b7a0379248b664d2d502ad22dbd4e7f0ff45bd4278e3966eef9625d6
-
SSDEEP
24576:l6/w3tD5G92xGBAaUx8j/SAuH7qmECTBdof5bESjLmfG:cQ9rx1ZAS5ECTjohbrjLmfG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84a8ec440d02b7a3fb645ae35f091011381771ca970193199c5a21b4ddc35e48
Files
-
84a8ec440d02b7a3fb645ae35f091011381771ca970193199c5a21b4ddc35e48.exe windows:5 windows x86 arch:x86
701a33c76a6cba8d89bd7499550b8617
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateMutexW
ReleaseMutex
Sleep
OpenMutexW
QueryDosDeviceW
GetCurrentProcess
OpenProcess
ResumeThread
InitializeCriticalSection
GetACP
WideCharToMultiByte
FindFirstFileW
FindNextFileW
FindClose
GetLongPathNameW
CreateFileW
GetFileAttributesExW
HeapFree
GetVersionExW
GlobalAlloc
GlobalFree
HeapAlloc
LocalFree
GetProcessHeap
LockResource
GetSystemInfo
GetVolumeInformationW
GetDiskFreeSpaceW
GetLogicalDriveStringsW
LoadLibraryW
ResetEvent
InterlockedExchangeAdd
ReadFile
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
CreateDirectoryW
GetFullPathNameW
lstrlenW
GetTempPathW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
MoveFileExW
GetTempFileNameW
MoveFileW
GetCurrentProcessId
GlobalLock
GlobalUnlock
GlobalMemoryStatusEx
GetLocalTime
GetPrivateProfileStringW
TerminateProcess
LoadLibraryExW
lstrcmpiW
InterlockedIncrement
InterlockedExchange
IsBadStringPtrW
DeviceIoControl
GetFileSizeEx
lstrcpyW
lstrcatW
LocalAlloc
LoadLibraryA
GetEnvironmentVariableW
SystemTimeToFileTime
FileTimeToSystemTime
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FreeLibrary
GetModuleHandleW
DeleteCriticalSection
GetProcAddress
DecodePointer
FindResourceW
LoadResource
RaiseException
GetLastError
MultiByteToWideChar
GetCurrentThreadId
SetErrorMode
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
InterlockedDecrement
EnterCriticalSection
SetLastError
SizeofResource
GetTickCount
CloseHandle
SetEvent
CreateEventW
WaitForSingleObject
GetTimeZoneInformation
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
WaitForMultipleObjects
InterlockedPushEntrySList
InterlockedPopEntrySList
QueryPerformanceCounter
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ExpandEnvironmentStringsW
CreateProcessW
GetExitCodeProcess
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
EncodePointer
FormatMessageW
user32
LoadCursorW
TranslateMessage
CharNextW
PeekMessageW
DispatchMessageW
ShowWindow
RegisterClassExW
IsWindow
CopyRect
MonitorFromWindow
GetMonitorInfoW
GetClassInfoExW
PostMessageW
SetWindowLongW
UnregisterClassW
GetClientRect
SetWindowTextW
EndPaint
BeginPaint
PtInRect
OffsetRect
GetWindowThreadProcessId
GetParent
GetDesktopWindow
CreateWindowExW
WindowFromPoint
InvalidateRect
GetForegroundWindow
GetSystemMetrics
SetTimer
GetDlgItem
EndDialog
SetWindowPos
MoveWindow
SendMessageW
SystemParametersInfoW
ReleaseDC
GetDC
GetWindowLongW
DefWindowProcW
CallWindowProcW
GetActiveWindow
PostQuitMessage
DialogBoxParamW
GetMessageW
DestroyWindow
IsRectEmpty
gdi32
SetViewportOrgEx
SelectObject
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
advapi32
RegNotifyChangeKeyValue
RegCloseKey
GetUserNameW
RegQueryValueExW
RegOpenCurrentUser
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegDeleteValueW
RegOpenKeyExW
shell32
SHGetFolderPathW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
ole32
CoTaskMemFree
CoTaskMemRealloc
CreateStreamOnHGlobal
CoCreateInstance
CoTaskMemAlloc
oleaut32
VarUI4FromStr
shlwapi
SHDeleteKeyW
imm32
ImmDisableIME
gdiplus
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipSetTextRenderingHint
GdiplusStartup
GdipCreateFontFromLogfontW
GdipDeleteFont
GdipDrawString
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatTrimming
GdipCreateFromHDC
GdipDeleteGraphics
GdipFree
GdipAlloc
GdiplusShutdown
GdipDrawImageRectI
GdipDrawImageRectRectI
GdipGetImageHeight
GdipGetImageWidth
dbghelp
MiniDumpWriteDump
Exports
Exports
CheckSigner
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 612KB - Virtual size: 616KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE