D:\WorkSpace\mytcomponent\src\dumper\symbol\release_unicode\CrashDumper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1c2ab980dc6ad112426b16768e938a7603891a92d639e0e7ea9edfd1162e1499.exe
Resource
win7-20240903-en
General
-
Target
1c2ab980dc6ad112426b16768e938a7603891a92d639e0e7ea9edfd1162e1499.exe
-
Size
413KB
-
MD5
1b5d1b279d8f1bcade878f84e73fb134
-
SHA1
a2fc9147562c9be660f4b9dc896c12d9c724a96b
-
SHA256
1c2ab980dc6ad112426b16768e938a7603891a92d639e0e7ea9edfd1162e1499
-
SHA512
515a7c75e800c7cdcac11f5fead545df126d06ca36698b9901d6dfd18270a19688d329cb966253fce0afc06835d12059bb8f496626cf39a38d508890a6f4520c
-
SSDEEP
12288:YjgWb5Lh/4ho5owVP21x7iwa5/SWEZUSG:+Xh/Y4owVPq7Xa5/lE+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c2ab980dc6ad112426b16768e938a7603891a92d639e0e7ea9edfd1162e1499.exe
Files
-
1c2ab980dc6ad112426b16768e938a7603891a92d639e0e7ea9edfd1162e1499.exe.exe windows:5 windows x86 arch:x86
6354ea869cac2ce9b9b66b935a7581c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenW
GetProcAddress
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
SetLastError
FreeLibrary
MultiByteToWideChar
LoadLibraryExW
SetEvent
OpenEventW
GetFileAttributesExW
CreateFileW
CloseHandle
ReadFile
GetFileSize
MapViewOfFileEx
CreateFileMappingW
UnmapViewOfFile
FileTimeToSystemTime
FileTimeToLocalFileTime
WriteFile
WideCharToMultiByte
lstrlenA
LoadLibraryW
OpenProcess
CopyFileW
DeleteFileW
GetTempPathW
CreateProcessW
WaitForSingleObject
TerminateProcess
GetPrivateProfileStringW
GetPrivateProfileIntW
GetSystemDefaultLCID
GetCommandLineW
lstrcpyW
lstrcpynW
LoadLibraryA
GlobalMemoryStatusEx
Sleep
GetSystemTimes
GetVersionExW
FindClose
FindNextFileW
FindFirstFileW
FileTimeToDosDateTime
GetFileTime
GetCurrentThreadId
GetFileInformationByHandle
GetFileAttributesW
GetFileType
MapViewOfFile
DuplicateHandle
SystemTimeToFileTime
GetLocalTime
FindResourceW
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStringTypeW
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
InterlockedExchange
GetLocaleInfoA
GetStartupInfoW
HeapSetInformation
EncodePointer
RtlUnwind
DecodePointer
ExitProcess
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
GetProcessHeap
GetCurrentProcess
FlushInstructionCache
SetFilePointer
FindResourceExW
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetModuleFileNameW
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
InitializeCriticalSection
SetEnvironmentVariableA
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetEnvironmentVariableW
CompareStringW
GetConsoleMode
HeapDestroy
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetModuleHandleW
user32
GetGuiResources
SetCapture
ReleaseCapture
SetActiveWindow
EnableWindow
UpdateWindow
SetFocus
LoadIconW
GetWindowTextW
IsDialogMessageW
SetDlgItemTextW
IsDlgButtonChecked
MessageBoxW
GetWindowTextLengthW
SetWindowTextW
GetActiveWindow
DialogBoxParamW
IsWindow
GetDlgItem
SendMessageW
DefWindowProcW
PostQuitMessage
CreateDialogParamW
DestroyWindow
CharNextW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
ShowWindow
SetWindowLongW
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
GetParent
GetWindowLongW
EndDialog
CheckDlgButton
UnregisterClassA
gdi32
CreateFontW
GetStockObject
advapi32
RegSetValueExW
RegEnumValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
shell32
ExtractIconExW
SHCreateDirectoryExW
SHFileOperationW
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoUninitialize
CoCreateGuid
oleaut32
VarUI4FromStr
shlwapi
PathAppendW
PathAddBackslashW
PathIsRelativeW
PathCanonicalizeW
PathRemoveFileSpecW
PathStripPathW
PathRemoveBackslashW
PathFindExtensionW
PathFileExistsW
comctl32
InitCommonControlsEx
dbghelp
MiniDumpWriteDump
MiniDumpReadDumpStream
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 80KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE