d:\app.v1.7\bin\Release\appmain.pdb
Static task
static1
Behavioral task
behavioral1
Sample
90f510e612f67598641773a3082094f3ca54f544b4ee99c3caea0fe4f4cd8034N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90f510e612f67598641773a3082094f3ca54f544b4ee99c3caea0fe4f4cd8034N.exe
Resource
win10v2004-20241007-en
General
-
Target
90f510e612f67598641773a3082094f3ca54f544b4ee99c3caea0fe4f4cd8034N
-
Size
513KB
-
MD5
1226983feff6140209867e46e6a27ef0
-
SHA1
5fbb16483f4f314c344e798f8e746e9249327b57
-
SHA256
90f510e612f67598641773a3082094f3ca54f544b4ee99c3caea0fe4f4cd8034
-
SHA512
aa4c180abc0bdea63ffc7fa83538f2bc314f753526bd7fc307c531d1a487e3898fa8d7479b843e226d01769c42a443c9ce9a5d69caaafddb2ae82fb106a02d8f
-
SSDEEP
12288:WBq4SPQT1fBW28wvf7T7B7zh7ovUG3oICHlqyjK:WnSPwJ8Wd/OMG34Hl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90f510e612f67598641773a3082094f3ca54f544b4ee99c3caea0fe4f4cd8034N
Files
-
90f510e612f67598641773a3082094f3ca54f544b4ee99c3caea0fe4f4cd8034N.exe windows:5 windows x86 arch:x86
53082cc99097a8019650e3c9dd577585
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winhttp
WinHttpQueryDataAvailable
WinHttpSetTimeouts
WinHttpReadData
WinHttpCrackUrl
WinHttpOpenRequest
WinHttpOpen
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpSendRequest
iphlpapi
GetAdaptersInfo
psapi
EnumProcessModules
GetModuleBaseNameW
setupapi
SetupDiGetClassDevsW
CMP_WaitNoPendingInstallEvents
CM_Reenumerate_DevNode
CM_Locate_DevNodeW
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceInfoListDetailW
SetupDiEnumDeviceInfo
ws2_32
ntohs
shlwapi
PathFileExistsW
kernel32
WideCharToMultiByte
Sleep
FreeLibrary
CreateProcessW
HeapAlloc
GetCurrentProcess
HeapFree
WaitForSingleObject
GetModuleHandleW
GetProcessHeap
OpenProcess
LoadLibraryW
GetVersionExW
TerminateProcess
GetLastError
GetProcAddress
LoadLibraryA
DuplicateHandle
CloseHandle
GetCurrentProcessId
LocalFree
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
GetWindowsDirectoryA
GlobalAlloc
GetVolumeInformationA
GetEnvironmentVariableA
GlobalFree
CreateFileA
GetFileSize
CreateProcessA
GetStartupInfoA
CreateMutexW
ReleaseMutex
FindFirstFileW
MoveFileExW
GetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
CopyFileA
SetFileAttributesA
FindClose
MoveFileA
GetModuleFileNameA
FindNextFileW
DeleteFileW
SetFileAttributesW
DeleteFileA
GetPrivateProfileStringW
WritePrivateProfileStringW
WriteFile
CreateFileW
GetTickCount
GetFileAttributesW
DeviceIoControl
ReadFile
lstrlenW
ExpandEnvironmentStringsW
CreateDirectoryW
SetFilePointer
PeekNamedPipe
WaitForMultipleObjects
CreatePipe
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateEventW
ResetEvent
SetEvent
InterlockedExchange
CreateEventA
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
GetExitCodeThread
GetCurrentThreadId
DosDateTimeToFileTime
SystemTimeToFileTime
SetFileTime
GetFileType
InterlockedCompareExchange
InitializeCriticalSection
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
ExitThread
CreateThread
RaiseException
RtlUnwind
GetCPInfo
LCMapStringA
LCMapStringW
GetStringTypeW
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
SetLastError
HeapCreate
VirtualFree
QueryPerformanceCounter
GetACP
GetOEMCP
IsValidCodePage
HeapSize
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetStringTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetModuleHandleA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEndOfFile
GetCurrentDirectoryW
user32
RegisterClassW
CreateWindowExW
ShowWindow
SetWindowLongW
GetWindowLongW
LoadCursorW
wsprintfW
GetDlgCtrlID
GetWindowTextW
DestroyWindow
CallWindowProcW
PostQuitMessage
PostMessageW
KillTimer
RegisterDeviceNotificationW
UnregisterDeviceNotification
wvsprintfW
FindWindowW
GetMessageW
TranslateMessage
IsWindow
FindWindowExW
SendMessageW
DispatchMessageW
SetTimer
DefWindowProcW
advapi32
SetSecurityInfo
SetEntriesInAclW
OpenProcessToken
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegOpenKeyExW
RegEnumValueW
RegQueryInfoKeyW
GetTokenInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
CloseServiceHandle
OpenSCManagerW
OpenServiceW
QueryServiceStatus
RegQueryValueExW
shell32
SHGetSpecialFolderPathA
ShellExecuteExW
SHGetSpecialFolderPathW
Sections
.text Size: 395KB - Virtual size: 395KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cuoefje Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE