D:\Jenkins\.jenkins\workspace\master_lu\display_3dex\display_3dex\Release\Display3DEx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3.exe
Resource
win7-20240708-en
General
-
Target
63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3
-
Size
1.2MB
-
MD5
7ff52acf2b53d2b5a53b4fca405b3e78
-
SHA1
8c740dbb941aaa5af7addceca34e73cd41fc28d6
-
SHA256
63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3
-
SHA512
5f54ec667b1c0b578858aea83c793a03adec3323a49ddaf6465cfbd2cd8583ef16a94db82ec1c139603d41b66ed05c1fd817aabf7f5a91c2ce68459ceccaae87
-
SSDEEP
24576:catIvCEBXufFWij4EBbjQjcKIzs2JhoYQwORdYJK4NXJVz:wXwHpcszs2LQ3RCI43Vz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3
Files
-
63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3.exe windows:5 windows x86 arch:x86
bbdb7a85c8e2ee1f568cf8a65b9a995b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
LockResource
FindResourceExW
LoadLibraryW
GetSystemInfo
GetTimeZoneInformation
ResetEvent
RtlCaptureStackBackTrace
FindResourceW
GetModuleHandleW
GetModuleFileNameW
LoadLibraryExW
lstrcmpiW
SizeofResource
LoadResource
Sleep
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
CreateMutexW
ReleaseMutex
LocalFree
ReadConsoleW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
EnterCriticalSection
InitializeCriticalSection
SetLastError
GetLastError
GetCurrentThreadId
RaiseException
GetProcessHeap
HeapSize
HeapFree
SetStdHandle
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
FindFirstFileExA
SetConsoleCtrlHandler
EnumSystemLocalesW
GetUserDefaultLCID
HeapReAlloc
HeapAlloc
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapDestroy
GetProcAddress
FreeLibrary
InterlockedDecrement
InterlockedIncrement
DecodePointer
GetTimeFormatW
GetDateFormatW
GetFileType
GetACP
GetStdHandle
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
GetVersionExW
WideCharToMultiByte
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
DeleteFileW
GetFileSizeEx
ReadFile
SetFilePointer
CloseHandle
CreateFileW
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
GetExitCodeThread
GetNativeSystemInfo
TryEnterCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
FormatMessageW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
GetCurrentProcessId
GetFileSize
WriteFile
FlushFileBuffers
lstrlenA
GetPrivateProfileStringW
WritePrivateProfileStringW
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
GetTempPathW
CreateTimerQueue
SetEvent
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
VirtualProtect
SetProcessAffinityMask
ReleaseSemaphore
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WaitForMultipleObjectsEx
WaitForSingleObject
RtlUnwind
ExitThread
ResumeThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
SetEndOfFile
user32
PeekMessageW
TranslateMessage
DispatchMessageW
GetMessageW
PostMessageW
FindWindowW
GetWindowLongW
KillTimer
SetTimer
CallWindowProcW
PostQuitMessage
LoadCursorW
SetWindowLongW
wsprintfW
CharNextW
DestroyWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
DefWindowProcW
advapi32
RegQueryValueExW
CryptContextAddRef
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptSetKeyParam
CryptDestroyKey
CryptReleaseContext
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
CryptAcquireContextW
RegGetValueW
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ShellExecuteExW
ShellExecuteW
ole32
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SysFreeString
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
PathAppendW
PathAppendA
PathIsDirectoryW
PathCombineW
PathIsRelativeW
StrStrIA
StrStrIW
PathIsRootW
PathFileExistsW
comctl32
InitCommonControlsEx
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
crypt32
CertGetNameStringW
CryptStringToBinaryA
CryptStringToBinaryW
CryptBinaryToStringA
CryptBinaryToStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
urlmon
URLDownloadToCacheFileW
Sections
.text Size: 911KB - Virtual size: 910KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE