c:\Users\Mr.Anderson\Desktop\2008\Emot\Compressor_demo\Compressor\Release\Compressor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b0b2dddacf2846021cf6ba4dee679982e489076ee8d97def06ca2742957d7126.exe
Resource
win7-20240903-en
General
-
Target
b0b2dddacf2846021cf6ba4dee679982e489076ee8d97def06ca2742957d7126
-
Size
365KB
-
MD5
ec8ce552c301e3c7305e371950f2ec4a
-
SHA1
8aac87f8c9bdb02b46991ab082c7890f66401a0d
-
SHA256
b0b2dddacf2846021cf6ba4dee679982e489076ee8d97def06ca2742957d7126
-
SHA512
dc9592bebe9993cfb0d3538b2aab843fa9eb3117b4ebfd12bccd420ac73003323ca901fdea8d030f2e5a774186e563e2677a2939cc45477415ed9f7d41c4308b
-
SSDEEP
6144:9LHsfMZz0e/aVq6XX4jYDRbqzN7u/mnkzPccld5b2IOIQlNtGZknCv3fczlpVKdV:9jsMAe/aVdXXsYFbqp7drofczlnoV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b0b2dddacf2846021cf6ba4dee679982e489076ee8d97def06ca2742957d7126
Files
-
b0b2dddacf2846021cf6ba4dee679982e489076ee8d97def06ca2742957d7126.exe windows:5 windows x86 arch:x86
b0c2cc8016c9605955cc314433fef865
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
winmm
waveOutGetVolume
waveInReset
waveInUnprepareHeader
waveInClose
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutSetVolume
mixerOpen
mixerGetLineInfoA
mixerClose
mixerGetLineControlsA
mixerGetControlDetailsA
mixerSetControlDetails
mciGetErrorStringA
comctl32
ord17
kernel32
WriteConsoleA
LoadLibraryA
FreeLibrary
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetConsoleOutputCP
WriteConsoleW
OutputDebugStringA
VirtualAlloc
SetStdHandle
GetModuleHandleA
ExitProcess
GetTimeFormatA
SetConsoleCtrlHandler
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
HeapSize
CloseHandle
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetLocaleInfoW
GetTimeZoneInformation
CreateFileA
CompareStringA
CompareStringW
VirtualFree
HeapFree
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
RaiseException
RtlUnwind
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
SetEnvironmentVariableA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
GetProcAddress
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
FatalAppExitA
HeapReAlloc
HeapCreate
HeapDestroy
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
LoadIconA
DialogBoxParamA
SendMessageA
EndDialog
GetDlgItem
GetClientRect
GetDC
ReleaseDC
GetDlgCtrlID
ShowWindow
MessageBoxA
gdi32
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
DeleteObject
SelectObject
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ