C:\Users\admin\Desktop\azalia\Prod\IM\ph_exec.pdb
Static task
static1
Behavioral task
behavioral1
Sample
18637c278083785d8c5cafdcbf819407182fc554c90c75d02bd10d6a9c6feaff.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
18637c278083785d8c5cafdcbf819407182fc554c90c75d02bd10d6a9c6feaff.exe
Resource
win10v2004-20241007-en
General
-
Target
18637c278083785d8c5cafdcbf819407182fc554c90c75d02bd10d6a9c6feaff
-
Size
71KB
-
MD5
9ca39dbbb8835a2fce09d67c222ec394
-
SHA1
936e5e88e0b242e3ce5d165fdaefed9608485df5
-
SHA256
18637c278083785d8c5cafdcbf819407182fc554c90c75d02bd10d6a9c6feaff
-
SHA512
5b159785f30547b35ce6d8fe4c6c4eff74043e141fb023dcdbe76d6cb75dc3830f6bbf919aaa8837ca92da576b6c52bab96021205886ae38fb6d8f0459cf4f0e
-
SSDEEP
1536:e/4KVGCjxJPtiigF0tKh/eRBucQltP40PrqdKO7h/Ms:eJU+xJPtiZ/eRBGtJPrqcO7hk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18637c278083785d8c5cafdcbf819407182fc554c90c75d02bd10d6a9c6feaff
Files
-
18637c278083785d8c5cafdcbf819407182fc554c90c75d02bd10d6a9c6feaff.exe windows:5 windows x86 arch:x86
14d7a5762b03da9e2746411501b3d038
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
ws2_32
htonl
kernel32
WaitForMultipleObjects
CloseHandle
CreateThread
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
ResetEvent
CreateEventW
DeleteCriticalSection
CreateMutexW
CreateProcessW
GetCurrentProcess
SetHandleInformation
OpenProcess
GetLocaleInfoW
TerminateProcess
OpenMutexW
GetProcAddress
Process32FirstW
GetExitCodeThread
CreatePipe
Process32NextW
CreateFileW
CreateToolhelp32Snapshot
ReleaseMutex
GetVersion
GetVolumeInformationW
ExpandEnvironmentStringsW
GetLastError
GetModuleFileNameW
FindClose
FindNextFileW
FindFirstFileW
SetEndOfFile
SetFilePointerEx
GetFileAttributesW
ReadFile
GetFileSizeEx
MoveFileW
DeleteFileW
SetFileAttributesW
IsDebuggerPresent
CopyFileW
Sleep
HeapSize
TerminateThread
WriteFile
GetTickCount
GetLogicalDrives
GetComputerNameW
WaitForSingleObject
LoadLibraryW
MultiByteToWideChar
RtlUnwind
GetModuleHandleA
UnhandledExceptionFilter
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
GetModuleHandleW
ExitProcess
DecodePointer
GetStdHandle
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
user32
GetShellWindow
GetWindowThreadProcessId
advapi32
RegQueryValueExW
CryptDecrypt
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptSetKeyParam
CryptAcquireContextW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
DuplicateTokenEx
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.cdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE