C:\Users\samcnary\Desktop\legacyPM\core\CoreService\runtime\OriginLegacyCLI.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b4c6596d0771b7327b61f11954a32b0638cecd535ce9be43ce01538f491212c9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4c6596d0771b7327b61f11954a32b0638cecd535ce9be43ce01538f491212c9.exe
Resource
win10v2004-20241007-en
General
-
Target
b4c6596d0771b7327b61f11954a32b0638cecd535ce9be43ce01538f491212c9
-
Size
2.0MB
-
MD5
1cdf2a762372824d3929991bf7202641
-
SHA1
acd4fb724ffae7c5d91274b896d603b675acd16b
-
SHA256
b4c6596d0771b7327b61f11954a32b0638cecd535ce9be43ce01538f491212c9
-
SHA512
8ae56f16cc52cb12c6bf392ddc54a1170db242ba729a84398734530f4f7bb72e401dcb18153e4427f766c169352cbe64c83a830e1c2662689c6604717a7e02e9
-
SSDEEP
12288:Rd5xfIau24NrisiwzRe2nxg0v0h4/6SjXP1BWy9sFRJOxh7OmM8zALgR/ryFUvhi:j48sVi6fzl9Nxh7OmM8EH2vgL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4c6596d0771b7327b61f11954a32b0638cecd535ce9be43ce01538f491212c9
Files
-
b4c6596d0771b7327b61f11954a32b0638cecd535ce9be43ce01538f491212c9.exe windows:5 windows x86 arch:x86
fba9a06cd911d183f0aec1159c439b07
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeEnvironmentStringsW
CloseHandle
LocalFree
ResumeThread
lstrcpyW
FreeLibrary
LoadLibraryW
MultiByteToWideChar
GetProcAddress
Sleep
lstrcpynW
SetFilePointerEx
WriteFile
ReadFile
CreateFileW
FlushFileBuffers
GetFileSizeEx
RaiseException
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetLocaleInfoA
GetLocaleInfoW
SetFilePointer
AllocConsole
FreeConsole
GetStdHandle
lstrcmpiW
FormatMessageW
QueryPerformanceCounter
ReleaseSemaphore
CreateSemaphoreW
OpenSemaphoreW
GetConsoleMode
GetConsoleCP
RtlUnwind
GetSystemTimeAsFileTime
SetCurrentDirectoryW
FindResourceExW
GetLastError
GetStartupInfoW
lstrlenW
GetModuleFileNameW
GetEnvironmentStringsW
CreateProcessW
GetEnvironmentVariableW
GetCommandLineW
LockResource
SizeofResource
WideCharToMultiByte
LoadResource
FindResourceW
GetCurrentProcessId
GetTickCount
SetHandleCount
LCMapStringW
HeapCreate
IsProcessorFeaturePresent
GetStringTypeW
ExitProcess
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EncodePointer
DecodePointer
SetStdHandle
GetFileType
WriteConsoleW
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
user32
GetDesktopWindow
MessageBoxW
advapi32
RegQueryValueExW
RegOpenKeyW
IsTextUnicode
RegCreateKeyW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
shell32
CommandLineToArgvW
shlwapi
StrNCatW
PathFileExistsW
UrlEscapeW
UrlUnescapeW
Sections
.text Size: 149KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ