c:\Users\BEAUREGARD\Pictures\arsynmtmfc_src\WorkerThreads\Release\WorkerThreads.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8ab1adfa857d7738948aa16db0fd9b57ff5cb0e1f3921b696dbb5982dddba3f2.exe
Resource
win7-20240903-en
General
-
Target
8ab1adfa857d7738948aa16db0fd9b57ff5cb0e1f3921b696dbb5982dddba3f2
-
Size
505KB
-
MD5
d0722042b129cdef1602e60c04010a35
-
SHA1
23a0d994b55038e6e9edad63f36c12647105f5f9
-
SHA256
8ab1adfa857d7738948aa16db0fd9b57ff5cb0e1f3921b696dbb5982dddba3f2
-
SHA512
a587df77669ddd13431c9fc969785003078bddd5819020b3c5ae683e48f6edb45dd318d7c51de2a1e1c52f2c81d5849f9a132c5a7dcc2d6e1ee2d01ae810d5b1
-
SSDEEP
12288:ancNtDefm1QBgoximXwEPmqqjF3vg9xympuG0W:acHB1Qxx/XZYSHyVG0W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8ab1adfa857d7738948aa16db0fd9b57ff5cb0e1f3921b696dbb5982dddba3f2
Files
-
8ab1adfa857d7738948aa16db0fd9b57ff5cb0e1f3921b696dbb5982dddba3f2.exe windows:5 windows x86 arch:x86
184ce2699c59e05f9b52a89953417833
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
FileTimeToLocalFileTime
LocalFileTimeToFileTime
GetFileSizeEx
SetErrorMode
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
HeapAlloc
GetCommandLineA
GetStartupInfoA
HeapFree
HeapReAlloc
ExitProcess
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapCreate
GetStdHandle
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetACP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
WritePrivateProfileStringA
SystemTimeToFileTime
FileTimeToSystemTime
GetModuleHandleW
GetOEMCP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
GetDiskFreeSpaceA
GetFullPathNameA
GetTempFileNameA
GetFileTime
SetFileTime
GetFileAttributesA
CreateEventA
SuspendThread
SetThreadPriority
CloseHandle
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
InterlockedExchange
lstrcmpA
GetModuleFileNameA
GlobalFree
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
lstrcmpW
GetVersionExA
FreeResource
lstrlenA
GlobalLock
GlobalUnlock
GetCurrentProcessId
GetModuleHandleA
GlobalGetAtomNameA
GlobalAddAtomA
WideCharToMultiByte
GetLastError
SetLastError
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
WaitForMultipleObjects
SetEvent
ResumeThread
LoadLibraryA
CreateDirectoryA
VirtualAlloc
GetModuleHandleExA
GetProcAddress
GetCurrentProcess
WaitForSingleObject
FreeEnvironmentStringsA
Sleep
user32
WindowFromPoint
GetDCEx
LockWindowUpdate
SetCapture
CharUpperA
UnregisterClassA
GetNextDlgTabItem
EndDialog
ShowOwnedPopups
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetParent
GetSystemMenu
AppendMenuA
DeleteMenu
IsRectEmpty
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
IsChild
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
KillTimer
GetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
SetForegroundWindow
MessageBoxA
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
PtInRect
GetDC
ReleaseDC
GetWindowRect
IsZoomed
GetSystemMetrics
OffsetRect
FillRect
GetClientRect
UpdateWindow
GetClassNameA
GetSysColor
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
WinHelpA
SetWindowPos
SetFocus
GetWindowThreadProcessId
GetActiveWindow
IsWindowEnabled
EqualRect
GetDlgItem
SetTimer
SetRect
LoadCursorA
GetSysColorBrush
GetMenuItemInfoA
InflateRect
RemovePropA
CreateDialogIndirectParamA
EnableWindow
TranslateAcceleratorA
IsWindow
GetWindowLongA
ShowWindow
GetWindow
GetDesktopWindow
SetMenu
PostMessageA
BringWindowToTop
GetLastActivePopup
GetMenu
CopyRect
SetRectEmpty
IntersectRect
GetClassInfoA
CreatePopupMenu
GetMenuItemCount
GetMenuItemID
GetSubMenu
SetWindowLongA
GetDlgCtrlID
GetKeyState
LoadIconA
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
LoadAcceleratorsA
GetParent
SetActiveWindow
IsWindowVisible
InvalidateRect
IsIconic
SendMessageA
InsertMenuItemA
DispatchMessageA
gdi32
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreatePatternBrush
OffsetViewportOrgEx
CreateSolidBrush
CreateFontIndirectA
CreateRectRgnIndirect
PatBlt
SetRectRgn
CombineRgn
GetBkColor
Escape
SetViewportOrgEx
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
CreateRectRgn
Ellipse
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
StretchDIBits
DeleteDC
GetObjectA
CreateFontA
GetCharWidthA
DeleteObject
GetTextExtentPoint32A
GetTextMetricsA
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetStockObject
SelectClipRgn
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oleaut32
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ