mi_exe_stub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
658cfe8c1148ffe7accf737b307d601538e24ccde6e31398b5eeb8812c766ad5N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
658cfe8c1148ffe7accf737b307d601538e24ccde6e31398b5eeb8812c766ad5N.exe
Resource
win10v2004-20241007-en
General
-
Target
658cfe8c1148ffe7accf737b307d601538e24ccde6e31398b5eeb8812c766ad5N
-
Size
763KB
-
MD5
2f68d77c2c69789a7808eca8024a5610
-
SHA1
d11e6b3b6efb2a506dad2f77f6e51a012a187d2c
-
SHA256
658cfe8c1148ffe7accf737b307d601538e24ccde6e31398b5eeb8812c766ad5
-
SHA512
492e7cba11d461d2850ddddb0f793fe156c08415a08bb7aa62f51491955618920a7f5c7ba0fc66e7fe59f7585f25120b182a59e9a4dc35ca1b139e9cbd5146ea
-
SSDEEP
12288:IaANjWvlWdnMkwRlXxV8r36hZy/y50v7Pn+nz+9M4cXUqMOgDNylVqKH+S:IaAF4WdMkwRlXxVSq3OA0vrnmq0XBghg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 658cfe8c1148ffe7accf737b307d601538e24ccde6e31398b5eeb8812c766ad5N
Files
-
658cfe8c1148ffe7accf737b307d601538e24ccde6e31398b5eeb8812c766ad5N.exe windows:4 windows x86 arch:x86
48294c5bca30517dc7b85d22906ddc1e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
WaitForSingleObject
GetStartupInfoW
GetExitCodeProcess
CreateProcessW
SetFilePointer
ReadFile
DeleteFileW
GetModuleFileNameW
FormatMessageW
WideCharToMultiByte
FindResourceExW
lstrcmpiW
SetFilePointerEx
CloseHandle
RemoveDirectoryW
lstrlenW
MultiByteToWideChar
SizeofResource
SetLastError
LockResource
GetLastError
CopyFileW
lstrlenA
LocalFree
CreateDirectoryW
LoadResource
GetTempFileNameW
CreateFileW
GetVersionExW
WriteFile
RaiseException
GetTempPathW
FindResourceW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
RtlUnwind
OutputDebugStringA
msvcrt
_lock
_unlock
??3@YAXPAX@Z
wcscmp
memcmp
??_V@YAXPAX@Z
wcslen
??_U@YAPAXI@Z
strtol
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_XcptFilter
_cexit
__getmainargs
free
memmove
memcpy
memset
_ismbblead
_vsnwprintf
_errno
__CxxFrameHandler
?terminate@@YAXXZ
_controlfp
__dllonexit
_onexit
realloc
_exit
shlwapi
PathQuoteSpacesW
PathAppendW
ole32
CoInitializeEx
CoUninitialize
shell32
SHGetFolderPathW
ord680
user32
CharNextA
CharLowerBuffW
MessageBoxW
wvsprintfW
UnregisterClassA
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 724KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ