c:\Users\BEAUREGARD\Downloads\mfccalcctrl_demo\Release\CalculatorControl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fd52d6ca14141aa23b4fd97fc4cc79b4035f15e1e9a653561099dd5b5700fac7.exe
Resource
win7-20240903-en
General
-
Target
fd52d6ca14141aa23b4fd97fc4cc79b4035f15e1e9a653561099dd5b5700fac7.exe
-
Size
619KB
-
MD5
b72b15df7f47e1b1ee1ab2afd8d08cd2
-
SHA1
dd84cfd12eb8d3311d111d253f6f8844af14e9cf
-
SHA256
fd52d6ca14141aa23b4fd97fc4cc79b4035f15e1e9a653561099dd5b5700fac7
-
SHA512
694ab7fa601b03796160e623bdf20aa380069f91e0e14e03b82d93a2aa084de65f52d3cec15973005683e92ed293ed97c9e3c0835a6374a6b1d077bd6d195907
-
SSDEEP
12288:sUjZuoYh77pGfEPogTcvhQjMp4rtBJ/eofcDU/tjadZ:sBNhvpgXZ2MCJ/eo0ytadZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource fd52d6ca14141aa23b4fd97fc4cc79b4035f15e1e9a653561099dd5b5700fac7.exe
Files
-
fd52d6ca14141aa23b4fd97fc4cc79b4035f15e1e9a653561099dd5b5700fac7.exe.exe windows:5 windows x86 arch:x86
1db71adeabd2b6fdf16352a481aa05e4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RtlUnwind
RaiseException
HeapAlloc
GetCommandLineA
GetStartupInfoA
HeapFree
Sleep
ExitProcess
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetErrorMode
GetModuleHandleW
GetOEMCP
GetCPInfo
CreateFileA
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
LocalFree
lstrlenA
GlobalGetAtomNameA
GlobalFindAtomA
MultiByteToWideChar
lstrcmpW
GetVersionExA
GlobalUnlock
GlobalFree
GetCurrentProcessId
GetLastError
SetLastError
GlobalAddAtomA
CloseHandle
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
CompareStringA
InterlockedExchange
GlobalLock
lstrcmpA
GlobalAlloc
FreeLibrary
GetModuleHandleA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
LoadLibraryA
CreateDirectoryA
VirtualAlloc
GetProcAddress
GetEnvironmentStrings
GetCurrentProcess
user32
GetSysColorBrush
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
ShowWindow
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
RegisterClassA
GetSysColor
AdjustWindowRectEx
PtInRect
GetDlgCtrlID
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
SendMessageA
GetWindowRect
GetWindow
DestroyWindow
IsWindow
GetDlgItem
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
UnregisterClassA
IsIconic
GetClientRect
EnableWindow
LoadIconA
GetSystemMetrics
DispatchMessageA
TranslateMessage
CopyRect
PostMessageA
GetParent
LoadCursorA
DefWindowProcA
GetClassInfoA
GetKeyState
PostQuitMessage
CheckMenuItem
EnableMenuItem
GetMenuState
ModifyMenuA
IsWindowEnabled
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetViewportExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
TextOutA
RectVisible
PtVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
SelectObject
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 388KB - Virtual size: 388KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ