D:\jenkins\workspace\pc-2345mpcsafe-build\RhinoProtect\Publish\OutPut\Bin\Win32\release\pdb\2345ScUpgrade.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac2341ae854f04f37c197db8006ee882083bbb2c676f07fbe5484c387130ec33.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ac2341ae854f04f37c197db8006ee882083bbb2c676f07fbe5484c387130ec33.exe
Resource
win10v2004-20241007-en
General
-
Target
ac2341ae854f04f37c197db8006ee882083bbb2c676f07fbe5484c387130ec33
-
Size
1.8MB
-
MD5
e304bfdf53f9bed01f4b57771d6bd349
-
SHA1
35c6b9a63d32d14b846eeed72c6a8e08f822fa27
-
SHA256
ac2341ae854f04f37c197db8006ee882083bbb2c676f07fbe5484c387130ec33
-
SHA512
7f33ddf7fb1ef19490b5a00640e3198eb6217bbf7897d587937a87fc17efc9303eaab620a5421a971f78c0a1ac79baeb7d05cdcf45bd07a1ed51ba28c1f2d352
-
SSDEEP
49152:n+UrfhixSmnGLgj1yzHwnzzt/wwwwsG378E1HuiTGUFU0rp:n+UrfhNmnv3wE1p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac2341ae854f04f37c197db8006ee882083bbb2c676f07fbe5484c387130ec33
Files
-
ac2341ae854f04f37c197db8006ee882083bbb2c676f07fbe5484c387130ec33.exe windows:5 windows x86 arch:x86
df15bf0cdaca3328fa0ee6495a6f5304
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
GetModuleHandleW
GetExitCodeProcess
GetPrivateProfileStringW
InterlockedExchange
SetLastError
InterlockedExchangeAdd
GetTickCount
lstrlenW
GetFileAttributesW
LocalFree
HeapAlloc
WriteConsoleW
HeapSize
SetStdHandle
CreateThread
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
OpenProcess
WaitForSingleObject
WaitForMultipleObjects
HeapFree
CreateFileMappingW
FreeLibrary
GetProcAddress
FileTimeToLocalFileTime
LoadLibraryW
FileTimeToSystemTime
GetCurrentThreadId
VirtualQuery
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetModuleFileNameW
QueryDosDeviceW
GetCurrentProcess
CloseHandle
CreateEventW
GetCurrentProcessId
GetLastError
Sleep
GetProcessHeap
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
GetDriveTypeW
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
CreateFileW
GetFileAttributesExW
ExpandEnvironmentStringsW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
SearchPathW
TerminateProcess
OpenEventW
SetEvent
ResetEvent
GetACP
MultiByteToWideChar
WideCharToMultiByte
GetComputerNameExW
GlobalAlloc
GlobalFree
LoadLibraryA
LoadLibraryExW
GetVolumeInformationW
GetDiskFreeSpaceW
ReadFile
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
FindNextFileW
FindClose
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
GetSystemDirectoryW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
FormatMessageW
lstrcatW
lstrcpyW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
CreateMutexW
ReleaseMutex
OpenMutexW
DeviceIoControl
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
GetLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
GetStdHandle
GetFileType
OutputDebugStringW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
HeapReAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
MoveFileExW
user32
MessageBoxW
GetParent
GetUserObjectInformationW
GetProcessWindowStation
UnregisterClassW
GetWindowThreadProcessId
GetWindowRect
GetFocus
SetWindowPos
GetSystemMetrics
GetShellWindow
WindowFromPoint
AttachThreadInput
GetForegroundWindow
SetFocus
GetClassNameW
GetDesktopWindow
advapi32
ReportEventW
CreateServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
ChangeServiceConfig2W
DeleteService
ControlService
StartServiceW
OpenServiceW
LookupPrivilegeValueW
AdjustTokenPrivileges
SetEntriesInAclW
LookupPrivilegeNameW
SetNamedSecurityInfoW
EqualSid
AllocateAndInitializeSid
FreeSid
GetTokenInformation
RegCloseKey
OpenProcessToken
RegOpenKeyW
RegQueryValueExW
DeregisterEventSource
RegisterEventSourceW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHFileOperationW
ole32
CoCreateInstance
psapi
GetProcessImageFileNameW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ