e:\branches\csp_5_0r3t\branches\csp_5_0r3t_0\csp\out\x64\release\certmgr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5f974771b827e521b0b81c0a30913ba8b5d955eaa3e12202e15c89a295e4454b.exe
Resource
win7-20240729-en
General
-
Target
5f974771b827e521b0b81c0a30913ba8b5d955eaa3e12202e15c89a295e4454b
-
Size
253KB
-
MD5
098d5d1a8b36b7c9a091af6e3ce9198d
-
SHA1
90db784c995e2839e4e4c344303262c95b81ea69
-
SHA256
5f974771b827e521b0b81c0a30913ba8b5d955eaa3e12202e15c89a295e4454b
-
SHA512
f0c62a2802ac6408e7488331e08d97009068b344ba594e3ee67ef6c8e2a28e226509de98029098cb20134e2a359cbbd84551bf3a7009318c286b7d9905b8e73b
-
SSDEEP
3072:xjYpzbPNvWUb90DZaWmaWR18UUIwTxSIifCsEsFwjvh/40tMgMDASesWYZWEV0+L:4bPxLbmoEWcMwTxSIi0CwzhQztUYS0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f974771b827e521b0b81c0a30913ba8b5d955eaa3e12202e15c89a295e4454b
Files
-
5f974771b827e521b0b81c0a30913ba8b5d955eaa3e12202e15c89a295e4454b.exe windows:5 windows x64 arch:x64
89f76dc2c7e5391656c0815bee9e7d00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcrt
_CxxThrowException
_unlock
__dllonexit
_lock
_onexit
??1type_info@@UEAA@XZ
__wgetmainargs
_XcptFilter
_exit
_cexit
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
strcmp
memmove
?terminate@@YAXXZ
ungetc
memset
memcpy
_stricmp
__C_specific_handler
setlocale
fwprintf
fread
__iob_func
scanf
getchar
wcsstr
_wfopen
wcschr
fwrite
rewind
_fileno
_setmode
wcsncpy
wcstoul
fseek
_wtoi
_snwprintf
fclose
fflush
_wcsicmp
towlower
calloc
??0bad_cast@@QEAA@AEBV0@@Z
??0bad_cast@@QEAA@PEBD@Z
??1bad_cast@@UEAA@XZ
ftell
exit
wprintf
??_U@YAPEAX_K@Z
_msize
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
??0exception@@QEAA@XZ
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
realloc
??2@YAPEAX_K@Z
??_V@YAXPEAX@Z
??3@YAXPEAX@Z
malloc
free
memcmp
_ftime64
fgetc
fputc
setvbuf
fgetpos
fsetpos
__pctype_func
isupper
___lc_codepage_func
___lc_handle_func
islower
abort
_vsnwprintf
wcsrchr
wcsncmp
srand
rand
_errno
__CxxFrameHandler
wcscmp
kernel32
lstrcmpA
GetCurrentThread
OutputDebugStringW
GetTempPathW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
FreeLibrary
LoadLibraryW
RaiseException
LoadLibraryA
QueryActCtxW
GetSystemWindowsDirectoryA
DeactivateActCtx
LocalAlloc
FindActCtxSectionStringW
GetModuleFileNameW
LoadLibraryExA
OutputDebugStringA
GetModuleHandleExW
ActivateActCtx
CreateActCtxW
GetModuleFileNameA
GetUserDefaultUILanguage
GetConsoleOutputCP
LocalFree
FileTimeToSystemTime
FormatMessageW
GetStdHandle
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
GetLastError
SetLastError
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
LCMapStringW
WideCharToMultiByte
MultiByteToWideChar
GetProcAddress
GetModuleHandleW
DecodePointer
EncodePointer
Sleep
VirtualProtect
CloseHandle
ntdll
RtlGetNtVersionNumbers
RtlQueryRegistryValues
Exports
Exports
db_ctx
Sections
.text Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 8KB - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ