D:\work\prod.tally9-erp9a.STABLE\tally.migtool\main\bin\release\tally72migration.pdb
Static task
static1
Behavioral task
behavioral1
Sample
35a024a8061d7a16df610a6d5ada32b4d49fc2d100afae6d46e21fbb222b8259.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
35a024a8061d7a16df610a6d5ada32b4d49fc2d100afae6d46e21fbb222b8259.exe
Resource
win10v2004-20241007-en
General
-
Target
35a024a8061d7a16df610a6d5ada32b4d49fc2d100afae6d46e21fbb222b8259.exe
-
Size
6.1MB
-
MD5
df6718e753a5e332324668e42be287f9
-
SHA1
3823f64ab8c1a1c0ed3aed733dc2dcaf9c39ac55
-
SHA256
35a024a8061d7a16df610a6d5ada32b4d49fc2d100afae6d46e21fbb222b8259
-
SHA512
6478dad0f66dc1a90ec17b9f81318ecdc24a32341cf86d4e48a636d1afca62eb64bec4f09046e04ca0287030b47462b692aebfb0e533a270e307f939410f984b
-
SSDEEP
49152:3haPxKaewcMF46KEGzUUwu0KM+N8YS+DG4EqJtCAza9j+D5NUOWWuvks97zPokaL:3ha5KatcvXBwu0dQ7CAza9s5YH9+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35a024a8061d7a16df610a6d5ada32b4d49fc2d100afae6d46e21fbb222b8259.exe
Files
-
35a024a8061d7a16df610a6d5ada32b4d49fc2d100afae6d46e21fbb222b8259.exe.exe windows:4 windows x86 arch:x86
cd1a841d765be5a514d85e4c4c68c09b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalLock
GlobalAlloc
LockFile
UnlockFile
ReadFile
FlushFileBuffers
SetFilePointer
SetEndOfFile
WriteFile
SizeofResource
LockResource
LoadResource
FindResourceA
SetLastError
GetCurrentThreadId
GlobalMemoryStatus
GetTickCount
FlushConsoleInputBuffer
GetStdHandle
GetSystemDirectoryA
GetTimeZoneInformation
GetDriveTypeA
GetWindowsDirectoryA
GetSystemInfo
lstrlenA
LocalFree
HeapFree
HeapAlloc
GlobalUnlock
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
RtlUnwind
SetConsoleCtrlHandler
RaiseException
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
IsBadWritePtr
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
SetHandleCount
GetFileType
LCMapStringA
GetStringTypeA
SetStdHandle
InterlockedExchange
VirtualQuery
VirtualProtect
InitializeCriticalSection
GetACP
GetOEMCP
CompareStringA
SetEnvironmentVariableA
GetLocaleInfoA
IsBadReadPtr
IsBadCodePtr
GlobalFree
GetVersionExA
FreeLibrary
GetCurrentProcessId
QueryPerformanceCounter
SetErrorMode
GetModuleFileNameA
FormatMessageA
GetProfileStringA
LoadLibraryA
InterlockedDecrement
ResetEvent
OpenProcess
WaitForSingleObject
TerminateProcess
CreateFileMappingA
GetCurrentProcess
DuplicateHandle
CreateProcessA
GetExitCodeProcess
MapViewOfFile
CreateEventA
Beep
FindNextFileA
SetFileAttributesA
GetLastError
GetDiskFreeSpaceA
CreateFileA
GetFileSize
CloseHandle
FindFirstFileA
FindClose
SetUnhandledExceptionFilter
DeleteFileA
Sleep
FileTimeToLocalFileTime
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
GetCurrentDirectoryA
GetSystemTimeAsFileTime
GetFullPathNameA
CreateDirectoryA
RemoveDirectoryA
LocalUnlock
LocalLock
LocalAlloc
MoveFileExA
FileTimeToSystemTime
user32
SetTimer
GetWindowThreadProcessId
EnumWindows
SendMessageA
WaitForInputIdle
HideCaret
CreateCaret
SetCaretPos
ShowCaret
GetDC
EnumDisplaySettingsA
GetKeyboardState
MessageBoxA
GetWindowDC
DrawIcon
OpenClipboard
DestroyWindow
LoadIconA
GetDesktopWindow
RegisterClassA
KillTimer
GetSystemMetrics
CreateWindowExA
ShowWindow
SetFocus
GetClientRect
DispatchMessageA
GetQueueStatus
PeekMessageA
GetMessageA
TranslateMessage
SetWindowPos
EndPaint
BeginPaint
DefWindowProcA
SetRect
FrameRect
FillRect
CloseClipboard
GetKeyState
ShowScrollBar
SetClipboardData
SystemParametersInfoA
LoadImageA
InvalidateRect
SetScrollInfo
SetScrollPos
PostMessageA
LoadCursorA
EmptyClipboard
GetFocus
GetUpdateRect
PostQuitMessage
RegisterClassExA
UpdateWindow
PtInRect
ReleaseDC
GetCursorPos
wsprintfA
gdi32
CreateRectRgn
DeleteDC
GetDeviceCaps
CreateCompatibleDC
GetStockObject
DeleteObject
SelectObject
CreatePen
SetTextColor
CreateSolidBrush
CombineRgn
SetTextJustification
GetDIBits
SetEnhMetaFileBits
GetEnhMetaFileHeader
PlayEnhMetaFile
CreateDCA
CreateCompatibleBitmap
SetBkColor
GetRgnBox
GetTextExtentPointA
BitBlt
FrameRgn
SelectClipRgn
CreateFontIndirectA
StretchBlt
MoveToEx
PatBlt
SetStretchBltMode
TextOutA
SetBkMode
CreateBitmap
SetTextAlign
SetTextCharacterExtra
Escape
StartPage
StartDocA
AbortDoc
EndDoc
EndPage
DeleteEnhMetaFile
GetEnhMetaFileBits
CloseEnhMetaFile
PtInRegion
CreateHalftonePalette
CreatePalette
GetDIBColorTable
GetObjectA
RealizePalette
SelectPalette
PaintRgn
LineTo
GetTextMetricsA
CreateEnhMetaFileA
SetRectRgn
rpcrt4
UuidFromStringA
wininet
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetCreateUrlA
InternetSetOptionA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
HttpQueryInfoA
InternetWriteFile
HttpEndRequestA
InternetQueryOptionA
HttpSendRequestExA
InternetQueryDataAvailable
InternetAttemptConnect
InternetSetFilePointer
FtpOpenFileA
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
ole32
CoCreateGuid
CoCreateInstance
CLSIDFromProgID
CoUninitialize
CoInitialize
oleaut32
VariantInit
SysAllocString
VariantClear
SysFreeString
GetErrorInfo
winspool.drv
EndDocPrinter
DeviceCapabilitiesA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
StartPagePrinter
StartDocPrinterA
EndPagePrinter
WritePrinter
wsock32
connect
WSACleanup
accept
gethostbyname
ntohs
recv
send
ioctlsocket
ntohl
htonl
inet_addr
gethostbyaddr
getsockname
WSASetLastError
htons
WSAAsyncSelect
WSAStartup
closesocket
shutdown
WSAGetLastError
socket
odbc32
ord13
ord15
ord14
ord16
ord27
ord11
ord41
ord75
ord24
ord18
ord36
ord4
rasapi32
RasHangUpA
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ