E:\Simba\WorkShop\Simba18B\Source\Common\pdb\SprdMesUpload.pdb
Static task
static1
Behavioral task
behavioral1
Sample
379427c30836df1b923d215280f44a293699b747cece7becf63ac71efe5f2ac0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
379427c30836df1b923d215280f44a293699b747cece7becf63ac71efe5f2ac0.exe
Resource
win10v2004-20241007-en
General
-
Target
379427c30836df1b923d215280f44a293699b747cece7becf63ac71efe5f2ac0
-
Size
149KB
-
MD5
09d4f9c51c8cdebb09bc29d7e2415223
-
SHA1
6441df1795aa8b2628b66641f2658bf4eb33c158
-
SHA256
379427c30836df1b923d215280f44a293699b747cece7becf63ac71efe5f2ac0
-
SHA512
ab5c4dda95f7d555d6da48ae2246a5562aa54aa46280b921fe2df78226076f6cb506d06d759d07297ad7a6e6793e1f25be0eee7bb05bbe537735bea634868691
-
SSDEEP
3072:5Br1NinUgE/oi1O+5wbjrWKmlpXk47tdXL6wbRI+x8OoxBe:5BrrqUloi1O+2U/dWqRIa8VxU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 379427c30836df1b923d215280f44a293699b747cece7becf63ac71efe5f2ac0
Files
-
379427c30836df1b923d215280f44a293699b747cece7becf63ac71efe5f2ac0.exe windows:5 windows x86 arch:x86
f8de1b6a9c479aed12378449daf601ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc100u
ord3261
ord4359
ord7618
ord7241
ord788
ord1212
ord10081
ord13047
ord7903
ord3754
ord5900
ord3482
ord2188
ord13181
ord3498
ord7246
ord12512
ord10960
ord7047
ord5198
ord2528
ord7391
ord6225
ord11333
ord280
ord5828
ord2614
ord2615
ord4309
ord1479
ord1476
ord2135
ord2136
ord7877
ord4153
ord1487
ord1320
ord903
ord310
ord4513
ord9498
ord11240
ord11209
ord11845
ord5118
ord9328
ord6140
ord1934
ord12753
ord1895
ord7176
ord1292
ord890
ord6869
ord9447
ord11123
ord8179
ord10058
ord10412
ord3627
ord2981
ord2980
ord2756
ord5556
ord12606
ord2417
ord8277
ord11163
ord8347
ord4805
ord12951
ord9525
ord6711
ord948
ord381
ord6344
ord3397
ord8599
ord6870
ord2185
ord5855
ord5862
ord3446
ord5801
ord1266
ord897
ord6117
ord11476
ord9333
ord7393
ord4792
ord6922
ord6932
ord6931
ord5468
ord4623
ord4794
ord4645
ord5143
ord1905
ord8483
ord5115
ord4923
ord4642
ord11159
ord2852
ord2951
ord2952
ord3491
ord11116
ord2339
ord5276
ord12557
ord10725
ord6156
ord13388
ord7109
ord13382
ord2665
ord3992
ord14067
ord3999
ord4416
ord4383
ord4379
ord4413
ord4434
ord4392
ord4421
ord4430
ord4400
ord4404
ord4408
ord4396
ord4425
ord4388
ord1519
ord1512
ord1514
ord1508
ord1501
ord11244
ord11246
ord12724
ord2853
ord8393
ord10045
ord6247
ord970
ord5846
ord1014
ord5883
ord5325
ord8270
ord3752
ord979
ord421
ord3846
ord4511
ord1310
ord11683
ord4151
ord7876
ord7624
ord7548
ord11784
ord13854
ord4744
ord11210
ord8112
ord13380
ord11477
ord13381
ord7108
ord13387
ord8530
ord3684
ord10937
ord3402
ord3625
ord11864
ord7126
ord1739
ord14162
ord10976
ord13267
ord11469
ord7179
ord13570
ord13567
ord13572
ord13569
ord13571
ord13568
ord11081
ord8273
ord14060
ord14059
ord14132
ord14149
ord14145
ord14147
ord14148
ord14146
ord2418
ord7385
ord2884
ord2887
ord12610
ord5558
ord2844
ord3763
ord12147
ord11801
ord4290
ord296
ord902
ord2068
ord286
ord1987
ord266
ord3416
ord5261
ord11228
ord4901
ord2164
ord11236
ord8346
ord4086
ord2089
ord1298
ord5231
ord1300
msvcr100
memset
_CxxThrowException
__CxxFrameHandler3
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
wcsftime
_beginthreadex
exit
sprintf_s
wcscat_s
malloc
vswprintf_s
swprintf_s
_localtime64_s
_time64
_ftime64
?what@exception@std@@UBEPBDXZ
wcsncpy_s
strncpy_s
strtol
strtod
wcsstr
wcscpy_s
strstr
strcpy_s
??0exception@std@@QAE@ABV01@@Z
free
memmove
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
memcpy
kernel32
GetLastError
CreateDirectoryW
CloseHandle
CreatePipe
SetHandleInformation
WaitForSingleObject
PeekNamedPipe
ReadFile
Sleep
GetCurrentProcessId
OpenProcess
TerminateProcess
CreateProcessW
FindFirstFileW
FindClose
FindNextFileW
CreateMutexW
GetTempPathW
CreateEventW
lstrlenW
MoveFileExW
lstrlenA
GetExitCodeProcess
ResetEvent
SetEvent
GetModuleFileNameW
MultiByteToWideChar
GetStdHandle
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
WideCharToMultiByte
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
FlushFileBuffers
WriteFile
WritePrivateProfileStringW
GetPrivateProfileStringW
user32
IsIconic
KillTimer
EnableMenuItem
SetForegroundWindow
GetMenuState
CreatePopupMenu
GetCursorPos
DrawIcon
GetClientRect
GetSystemMetrics
EnableWindow
SetTimer
SetWindowLongW
GetWindowLongW
AppendMenuW
GetSystemMenu
LoadIconW
MessageBoxW
SendMessageW
InvalidateRect
GetSysColor
gdi32
CreateSolidBrush
CreateFontW
shell32
SHBrowseForFolderW
SHGetPathFromIDListW
SHCreateDirectoryExW
ShellExecuteExW
Shell_NotifyIconW
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsW
PathIsRootW
PathIsRelativeW
PathRemoveBackslashW
PathRemoveFileSpecW
msvcp100
??0_Lockit@std@@QAE@H@Z
??1_Lockit@std@@QAE@XZ
?_Xlength_error@std@@YAXPBD@Z
?_Decref@facet@locale@std@@QAEPAV123@XZ
psapi
GetModuleFileNameExW
EnumProcesses
isplog
CreateISpLogObject
spdbapp
SPDB_CreateISprdDBObject
SPDB_ReleaseISprdObject
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE