C:\Users\OFFICE\Desktop\AsteriskPassword-main\AsteriskPassword-main\Debug\AsteriskPassword.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac9d354118e70b1dc4390c92f3eaacb4511a429f6d4109236cf036565a066c44.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac9d354118e70b1dc4390c92f3eaacb4511a429f6d4109236cf036565a066c44.exe
Resource
win10v2004-20241007-en
General
-
Target
ac9d354118e70b1dc4390c92f3eaacb4511a429f6d4109236cf036565a066c44
-
Size
154KB
-
MD5
d20684d90f20a5a839af330a44fa01d0
-
SHA1
f6d8462a11774e5b27bbe2ac7921ef5769fa47c8
-
SHA256
ac9d354118e70b1dc4390c92f3eaacb4511a429f6d4109236cf036565a066c44
-
SHA512
c74e00e70869adec08c052f945e61ecde4fe35a953c537224cbbab804d2b8e2daaf0c733c4f432fdc77984a50386dd6e498aca50c799bceb19f9c519ece935d5
-
SSDEEP
3072:n2hNjkwCs6J9Zl3fhf4hCquhFB1Cf8uHC:076Tv/d1Cf8t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac9d354118e70b1dc4390c92f3eaacb4511a429f6d4109236cf036565a066c44
Files
-
ac9d354118e70b1dc4390c92f3eaacb4511a429f6d4109236cf036565a066c44.exe windows:6 windows x86 arch:x86
e6201d520d0a0418253be33131f63dce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc140ud
ord9830
ord14698
ord302
ord14132
ord3856
ord3977
ord3976
ord4596
ord14085
ord3220
ord6546
ord6549
ord16667
ord7225
ord16093
ord13636
ord15593
ord8290
ord3344
ord15933
ord17189
ord9512
ord17183
ord3635
ord5391
ord11511
ord7021
ord5405
ord5946
ord5885
ord5870
ord5932
ord5977
ord5900
ord5955
ord5971
ord5912
ord5918
ord5924
ord5906
ord5961
ord5894
ord2033
ord2012
ord2026
ord2000
ord1978
ord14241
ord14245
ord16316
ord1606
ord12887
ord12521
ord12563
ord12679
ord8456
ord4739
ord3089
ord5393
ord10763
ord17181
ord13868
ord4477
ord14049
ord10945
ord13645
ord13644
ord6832
ord12115
ord12111
ord12113
ord12114
ord12112
ord17378
ord9876
ord12081
ord3899
ord3902
ord3752
ord3751
ord4017
ord4016
ord12304
ord6131
ord12901
ord10840
ord2928
ord5037
ord11018
ord3312
ord16160
ord7547
ord14092
ord2587
ord10150
ord7941
ord493
ord14137
ord11044
ord2776
ord2780
ord2616
ord10108
ord14223
ord12265
ord15098
ord15030
ord5501
ord9589
ord10024
ord6470
ord2887
ord14610
ord14609
ord17182
ord9511
ord17188
ord11212
ord4819
ord4757
ord15117
ord9533
ord2379
ord13921
ord13920
ord17050
ord14599
ord9592
ord17260
ord7727
ord17262
ord7729
ord17261
ord7728
ord16367
ord1095
ord8268
ord4493
ord7198
ord14215
ord9885
ord14233
ord14183
ord1223
ord4759
ord6303
ord6711
ord6991
ord11164
ord6679
ord6994
ord6306
ord6537
ord6282
ord9264
ord9265
ord9254
ord6535
ord9889
ord12076
ord11017
ord1176
ord1145
ord1885
ord15341
ord1662
ord1652
ord1660
ord5201
ord6123
ord9006
ord1653
ord16938
ord8824
ord1036
ord1225
ord15727
ord10210
ord5153
ord13299
ord3024
ord9164
ord3857
ord12208
ord2804
kernel32
lstrcmpiW
MultiByteToWideChar
SetLastError
OutputDebugStringW
DecodePointer
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
OutputDebugStringA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
LoadLibraryW
GetCurrentThreadId
FreeLibrary
VirtualQuery
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
RaiseException
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetLastError
user32
IsWindowVisible
ReleaseCapture
GetWindowRect
SetCursor
GetCursorPos
WindowFromPoint
PtInRect
PostMessageW
GetWindowLongW
SetWindowLongW
GetParent
GetClassNameW
GetWindow
LoadCursorW
UnregisterClassW
SendMessageW
SendMessageTimeoutW
PostQuitMessage
SetWindowWord
PeekMessageW
gdi32
DeleteDC
oleaut32
SysFreeString
gdiplus
GdiplusShutdown
vcruntime140d
__vcrt_LoadLibraryExW
__vcrt_GetModuleHandleW
__vcrt_GetModuleFileNameW
__std_type_info_destroy_list
_except_handler4_common
__current_exception_context
__current_exception
memset
__CxxFrameHandler3
memmove
ucrtbased
malloc
_CrtDbgReportW
wcscpy_s
__stdio_common_vswprintf
__stdio_common_vsnwprintf_s
_seh_filter_exe
_set_app_type
__setusermatherr
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_exit
_set_fmode
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
free
__p__commode
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_CrtDbgReport
terminate
_controlfp_s
strcpy_s
strcat_s
__stdio_common_vsprintf_s
_wmakepath_s
_wsplitpath_s
_invalid_parameter_noinfo
_errno
_recalloc
_set_new_mode
__stdio_common_vsprintf
__stdio_common_vswprintf_s
wcslen
__stdio_common_vsnprintf_s
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1024B - Virtual size: 953B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ