spider.pdb
Static task
static1
Behavioral task
behavioral1
Sample
85ee712779bffd13c66ed4273d7854f6f6fc42db2212c3a67341932ddb2c1f52N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
85ee712779bffd13c66ed4273d7854f6f6fc42db2212c3a67341932ddb2c1f52N.exe
Resource
win10v2004-20241007-en
General
-
Target
85ee712779bffd13c66ed4273d7854f6f6fc42db2212c3a67341932ddb2c1f52N
-
Size
551KB
-
MD5
e7215517a6782eb556ec3699c45e3f60
-
SHA1
f7f5ad9ec15eff780bb311d7b2f76e15f69a9334
-
SHA256
85ee712779bffd13c66ed4273d7854f6f6fc42db2212c3a67341932ddb2c1f52
-
SHA512
86fc5522da6ab808b219601851b9f5e191493c065c219ef5b6ab98d3adadac8050105bb2a0da8a7845b64121c0ccc6959b688d052438e18bc2c503b0c4052dd4
-
SSDEEP
6144:gtsvwNz1LfkGB1usvJR3djOuY0yKzOI23CBdfNJ/9+FixStM:gsvwLJRdOeyuOI2alz+4d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85ee712779bffd13c66ed4273d7854f6f6fc42db2212c3a67341932ddb2c1f52N
Files
-
85ee712779bffd13c66ed4273d7854f6f6fc42db2212c3a67341932ddb2c1f52N.exe windows:5 windows x86 arch:x86
62ff38f10b39db8a0856c327b9755044
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExA
RegOpenKeyExA
kernel32
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
HeapAlloc
HeapReAlloc
HeapSize
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
RaiseException
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
GetStdHandle
GetModuleHandleA
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
CreateFileW
QueryPerformanceCounter
MulDiv
lstrlenW
GetVersionExA
WriteFile
GetModuleHandleW
Sleep
GetFileSize
GlobalAlloc
ReadFile
lstrcpyW
CloseHandle
GlobalFree
lstrcatW
gdi32
SaveDC
GetDeviceCaps
CreateFontIndirectW
Ellipse
GetTextExtentPoint32W
GetPixel
GdiFlush
ExcludeClipRect
RestoreDC
CreateCompatibleBitmap
CreateSolidBrush
GetStockObject
GetBkMode
GetTextColor
SetBkMode
SetTextColor
SetPixel
MoveToEx
LineTo
CreateCompatibleDC
SelectObject
BitBlt
DeleteObject
DeleteDC
user32
GetWindowRect
InvalidateRect
EndDialog
PeekMessageW
EnableMenuItem
GetMenu
DialogBoxParamW
LoadStringW
MessageBoxW
ReleaseDC
GetDC
SetCapture
GetWindowPlacement
IsIconic
IsZoomed
DrawMenuBar
DrawTextW
SetRect
FrameRect
FillRect
OffsetRect
InvertRect
IntersectRect
ReleaseCapture
UpdateWindow
PostMessageW
PtInRect
GetSubMenu
GetDesktopWindow
MoveWindow
DefWindowProcW
GetForegroundWindow
ShowWindow
GetSystemMetrics
PostQuitMessage
EndPaint
BeginPaint
DestroyWindow
WaitMessage
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
CreateWindowExW
RegisterClassW
LoadCursorW
LoadIconW
MessageBoxA
LoadStringA
SetDlgItemTextW
GetDlgItem
WinHelpW
CheckDlgButton
IsDlgButtonChecked
CheckRadioButton
GetDlgItemTextW
UnionRect
SendMessageW
SetTimer
LoadBitmapW
wsprintfW
GetClientRect
GetParent
shell32
SHGetSpecialFolderPathW
winmm
timeGetTime
PlaySoundW
comctl32
InitCommonControlsEx
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 484KB - Virtual size: 486KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE