D:\rdm\projects\28820\pdb\Release\minibrowser_exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d53fe4d9fa7b8b6860cfa915c913878120a23180d19df31f1ccd5b4a6a0f438b.exe
Resource
win7-20240903-en
General
-
Target
d53fe4d9fa7b8b6860cfa915c913878120a23180d19df31f1ccd5b4a6a0f438b
-
Size
433KB
-
MD5
1c45dce4e5dcb3633674ac5f5ef2880b
-
SHA1
8d6bc937cf30451fa74e8c54c7334b2ae751c35e
-
SHA256
d53fe4d9fa7b8b6860cfa915c913878120a23180d19df31f1ccd5b4a6a0f438b
-
SHA512
70a0fe34540eb170ec65a32263cd9be4c238f9bd47a479814ed2adb55242e23ac2c3af75b90f766399d5c4f241e7c7992360ae9385944b0b76c04b7aa31d5b66
-
SSDEEP
6144:W4WATf7l+psswdSMLLSATCNxFx3TQqNLmYONyzuavq/fO:WITfgpsrdSsLTCNxgWL/ONmD0O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d53fe4d9fa7b8b6860cfa915c913878120a23180d19df31f1ccd5b4a6a0f438b
Files
-
d53fe4d9fa7b8b6860cfa915c913878120a23180d19df31f1ccd5b4a6a0f438b.exe windows:5 windows x86 arch:x86
a015389f60165399e844c3b119b7e185
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCrackUrlW
kernel32
HeapSize
GetProcessHeap
GetLastError
DeleteCriticalSection
LoadLibraryW
RtlCaptureContext
GetCurrentProcess
GetCurrentProcessId
SetUnhandledExceptionFilter
GetCurrentThreadId
IsDebuggerPresent
WaitForMultipleObjects
CloseHandle
DuplicateHandle
CreateEventW
GetModuleHandleW
CreateProcessW
SearchPathW
FreeLibrary
VirtualAlloc
VirtualFree
CreateThread
GetFileSize
ReadFile
GetSystemInfo
LoadLibraryExW
CreateFileW
GetVersionExW
GetCommandLineW
WideCharToMultiByte
ExpandEnvironmentStringsW
FindClose
WriteFile
GetPrivateProfileStringW
GetFullPathNameW
FindResourceW
LoadResource
SizeofResource
LocalFree
LockResource
FindResourceExW
LocalAlloc
OpenProcess
GetThreadContext
SetThreadContext
VirtualQuery
InterlockedCompareExchange
FlushInstructionCache
VirtualProtect
ResumeThread
SetLastError
GetSystemDirectoryW
Sleep
DeviceIoControl
GetNativeSystemInfo
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetModuleHandleExA
SetEnvironmentVariableA
WriteConsoleW
SetEndOfFile
FlushFileBuffers
SetStdHandle
SetFilePointerEx
GetConsoleCP
OutputDebugStringW
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetProcAddress
DecodePointer
MultiByteToWideChar
GetModuleFileNameW
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
RaiseException
InterlockedDecrement
InterlockedIncrement
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
GetConsoleMode
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
GetStdHandle
GetCurrentDirectoryW
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
EncodePointer
IsProcessorFeaturePresent
GetDriveTypeW
GetFullPathNameA
FindFirstFileExW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
RtlUnwind
GetCPInfo
UnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
user32
GetWindowLongW
SetWindowLongW
DefWindowProcW
CreateWindowExW
SetTimer
PostMessageW
KillTimer
IsWindow
GetWindowThreadProcessId
MessageBoxW
GetActiveWindow
SetForegroundWindow
BringWindowToTop
IsWindowVisible
SetWindowPos
ShowWindow
RegisterClassExW
DestroyWindow
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
CommandLineToArgvW
oleaut32
SysFreeString
SysAllocString
SysAllocStringLen
shlwapi
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
PathCombineW
netapi32
NetApiBufferFree
NetWkstaTransportEnum
Netbios
Sections
.text Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 90KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE