D:\data\landun\workspace\p-3d7f88f5f52b43179dd219a5c6dd1b5c\src\bin\Release_Win32\biz_notify.pdb
Static task
static1
Behavioral task
behavioral1
Sample
82759044c51ec386238a044bbeb740ae3d748e7ac168578ad66af14281370bac.exe
Resource
win7-20240708-en
General
-
Target
82759044c51ec386238a044bbeb740ae3d748e7ac168578ad66af14281370bac
-
Size
380KB
-
MD5
26fd35dbc2438e2173f5b250b5c643b3
-
SHA1
b975512202291b297210f38050c5f12535ebdd6e
-
SHA256
82759044c51ec386238a044bbeb740ae3d748e7ac168578ad66af14281370bac
-
SHA512
65293cf3693cea4760633af7a93bad018e00b73dfc1ffb56c1291f279dbfc3522cdda68ec06b06ae11f912a0f7cb398263a7098532f44515c157ce7990a1c49f
-
SSDEEP
6144:LIIIIAnObBs0l0yjkJR0ebjAOyqIBFlSb78Za/otdjlt1bUiYG:Xl0yA7joZG8Za/ov6iYG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82759044c51ec386238a044bbeb740ae3d748e7ac168578ad66af14281370bac
Files
-
82759044c51ec386238a044bbeb740ae3d748e7ac168578ad66af14281370bac.exe windows:6 windows x86 arch:x86
51876908a122dda667c06c499fc9df7d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryW
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCommandLineW
OpenMutexW
LoadLibraryExW
WriteFile
CreateFileW
FormatMessageW
LocalFree
HeapFree
LocalAlloc
OutputDebugStringW
HeapAlloc
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
CreateMutexW
ReleaseMutex
QueryPerformanceCounter
InitializeCriticalSectionEx
EncodePointer
GetStringTypeW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RaiseException
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
ExitProcess
GetStdHandle
GetFileType
HeapReAlloc
LCMapStringW
SetFilePointerEx
GetConsoleMode
IsValidCodePage
GetACP
GetOEMCP
FindFirstFileExW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
HeapSize
GetConsoleOutputCP
WriteConsoleW
GetEnvironmentVariableW
GetSystemDirectoryW
GetCurrentThreadId
FindClose
GetCurrentProcess
FindNextFileW
SetLastError
GetSystemTimeAsFileTime
lstrcmpW
GetLastError
GetProcessId
GetModuleFileNameW
DecodePointer
CloseHandle
AcquireSRWLockExclusive
SetEvent
ReleaseSRWLockExclusive
CreateEventW
WaitForSingleObject
InitOnceExecuteOnce
user32
SendInput
AllowSetForegroundWindow
shell32
ShellExecuteExW
ole32
CoRevokeClassObject
CoReleaseServerProcess
CoAddRefServerProcess
CoRegisterClassObject
CoResumeClassObjects
CoInitializeEx
imm32
ImmDisableIME
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
api-ms-win-core-winrt-error-l1-1-0
RoOriginateError
shlwapi
PathRemoveFileSpecW
PathAppendW
advapi32
AddAccessAllowedAceEx
GetLengthSid
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
InitializeSecurityDescriptor
InitializeAcl
RegCloseKey
RegCreateKeyExW
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 83KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE