c:\Users\BEAUREGARD\Downloads\mfccalcctrl_demo\Release\CalculatorControl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4a0cf57be8da2f45579e78a94f3dca00aea6612e3f5b7123cd8197eecceacfdb.exe
Resource
win7-20240903-en
General
-
Target
4a0cf57be8da2f45579e78a94f3dca00aea6612e3f5b7123cd8197eecceacfdb
-
Size
618KB
-
MD5
4362b640d3e1d7d70eef58fade4305bf
-
SHA1
1e7276619daebfc9cf3e41e3b7c06b39f4a7798c
-
SHA256
4a0cf57be8da2f45579e78a94f3dca00aea6612e3f5b7123cd8197eecceacfdb
-
SHA512
a7e616d14b5ca439ae429898c80e0aa1f20d8c30610f06dd52d5a2cb63ee4eb4363b077aa125b07f2d043290c3642fc5fd50c7040d643542ee0a173c689bd60e
-
SSDEEP
12288:tkDwmoShmmpXEPCZG1UrIujTQSk+wn0Y4GBinko/4GCGKyZDE93AbWxPPywg:tWnhDpZGOrZjT/USING5E93AbW1+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4a0cf57be8da2f45579e78a94f3dca00aea6612e3f5b7123cd8197eecceacfdb
Files
-
4a0cf57be8da2f45579e78a94f3dca00aea6612e3f5b7123cd8197eecceacfdb.exe windows:5 windows x86 arch:x86
1db71adeabd2b6fdf16352a481aa05e4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RtlUnwind
RaiseException
HeapAlloc
GetCommandLineA
GetStartupInfoA
HeapFree
Sleep
ExitProcess
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetErrorMode
GetModuleHandleW
GetOEMCP
GetCPInfo
CreateFileA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
LocalFree
lstrlenA
GlobalGetAtomNameA
GlobalFindAtomA
MultiByteToWideChar
lstrcmpW
GetVersionExA
GlobalUnlock
GlobalFree
GetCurrentProcessId
GetLastError
SetLastError
GlobalAddAtomA
CloseHandle
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryA
CreateDirectoryA
VirtualAlloc
GetProcAddress
GetEnvironmentStrings
GetCurrentProcess
user32
GetSysColorBrush
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ShowWindow
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
RegisterClassA
GetSysColor
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
SendMessageA
GetWindowRect
GetWindow
DestroyWindow
IsWindow
GetDlgItem
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
UnregisterClassA
IsIconic
GetClientRect
EnableWindow
LoadIconA
GetSystemMetrics
DispatchMessageA
TranslateMessage
CopyRect
PostMessageA
GetParent
LoadCursorA
DefWindowProcA
GetClassInfoA
GetKeyState
PostQuitMessage
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutA
RectVisible
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SelectObject
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 388KB - Virtual size: 387KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ