c:\412\lie\135\Long\Tie \Short\key.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dc5c92e43766184c98f47737d13f41cda2a04fc5cb4f7aa6e7341ee9f8428462.dll
Resource
win7-20240903-en
General
-
Target
dc5c92e43766184c98f47737d13f41cda2a04fc5cb4f7aa6e7341ee9f8428462.exe
-
Size
1.2MB
-
MD5
1fd2425d15eddaaf88f7e278fd9a0910
-
SHA1
e968121376c44d3a52a42281a4679eddd1a9a199
-
SHA256
dc5c92e43766184c98f47737d13f41cda2a04fc5cb4f7aa6e7341ee9f8428462
-
SHA512
1edacf0d60c906332549c9b93b340030d17ec39351cd277fa7c9fc9278ba0bf13c5325896e776b0f745d3ad9228bf909e4e33d9e07582ab52268f6acfa05b6b7
-
SSDEEP
24576:m/o9iBRudBYZb/WqWletdadgndrqnq/wKkVW/:YRuEbeqWYMqnFY2IW/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource dc5c92e43766184c98f47737d13f41cda2a04fc5cb4f7aa6e7341ee9f8428462.exe
Files
-
dc5c92e43766184c98f47737d13f41cda2a04fc5cb4f7aa6e7341ee9f8428462.exe.dll windows:6 windows x86 arch:x86
1a5119a1aa1907d9cf1064edbeb2ac74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SetEndOfFile
HeapReAlloc
HeapSize
WriteConsoleW
ReadConsoleW
FlushFileBuffers
SetStdHandle
CreateFileW
SetConsoleCtrlHandler
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
OutputDebugStringA
OutputDebugStringW
WaitForSingleObjectEx
CreateThread
CreateProcessA
VirtualProtectEx
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointerEx
GetSystemDirectoryA
OpenMutexA
GetTempPathA
GetEnvironmentVariableA
GetModuleFileNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
HeapAlloc
HeapFree
GetCurrentThread
GetACP
GetStringTypeW
GetStdHandle
GetFileType
CloseHandle
ReadFile
DecodePointer
user32
FrameRect
RegisterClassExA
UnhookWindowsHookEx
LockWindowUpdate
GetWindowTextLengthA
GetDlgCtrlID
SystemParametersInfoA
KillTimer
GetMenuItemInfoA
DrawTextA
GetWindowTextA
GetMessageTime
ScreenToClient
GetSystemMenu
ClientToScreen
gdi32
GetCharWidthA
GetClipBox
SetTextColor
SetBkColor
CreateBitmap
ole32
CoTaskMemAlloc
CoTaskMemFree
CoRevokeClassObject
CoUninitialize
CoInitialize
ws2_32
sendto
shutdown
htons
htonl
setsockopt
WSACleanup
recv
recvfrom
gethostname
getservbyname
ntohs
socket
send
getsockname
WSAStartup
gethostbyname
comctl32
ImageList_SetDragCursorImage
ImageList_Draw
CreatePropertySheetPageA
PropertySheetA
Exports
Exports
Hearfamily
Safefree
Winter
Sections
.text Size: 777KB - Virtual size: 776KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 382KB - Virtual size: 381KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ