D:\Jenkins\.jenkins\workspace\pay_group\defrag\defrag\Release\defrag.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9794efe79fb0b7e1ecbd554cdd635146eaa1dff73dfeaf4f4574a7a343527c78.exe
Resource
win7-20240903-en
General
-
Target
9794efe79fb0b7e1ecbd554cdd635146eaa1dff73dfeaf4f4574a7a343527c78
-
Size
1.4MB
-
MD5
7bc998d7637eb46802924896b470eef0
-
SHA1
be344335e6cfa5e8fa251ae5fa06e15466c815a4
-
SHA256
9794efe79fb0b7e1ecbd554cdd635146eaa1dff73dfeaf4f4574a7a343527c78
-
SHA512
1bf0222cf666ca94fe3756880dd6f657627bf169149b69b0cbdf0394e184dfa4ad9409e039ae2676f6f5697da1572649ec39264cb36da190e5e45e52d77c6039
-
SSDEEP
24576:HGyD4jD8crjNPIYINaawdLnsNnIrnshZGCYcfJ5ievr:QkB5rooCnsOCYcfJ5ievr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9794efe79fb0b7e1ecbd554cdd635146eaa1dff73dfeaf4f4574a7a343527c78
Files
-
9794efe79fb0b7e1ecbd554cdd635146eaa1dff73dfeaf4f4574a7a343527c78.exe windows:6 windows x86 arch:x86
cb8deac0c95c278180ca09932061cc96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryW
FindResourceW
IsBadReadPtr
GetPrivateProfileStringW
CreateFileA
CreateFileW
GetLogicalDriveStringsW
GetLongPathNameW
QueryDosDeviceW
DeviceIoControl
OpenProcess
lstrlenW
K32GetModuleFileNameExW
K32GetProcessImageFileNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
FindFirstFileW
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
GetVolumeInformationW
FindClose
FindNextFileW
GetCurrentThread
SetThreadPriority
ReadFile
GetCurrentThreadId
GetCurrentProcessId
CreateMutexW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetLastError
SetUnhandledExceptionFilter
GetCommandLineW
GetWindowsDirectoryW
GetDriveTypeW
MultiByteToWideChar
CreateEventW
WaitForSingleObject
SetEvent
DeleteCriticalSection
lstrcmpiW
GetProcessHeap
FlushFileBuffers
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
CloseHandle
SizeofResource
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetACP
GetStdHandle
ExitProcess
GetTimeZoneInformation
LockResource
LoadResource
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetModuleHandleExW
LoadLibraryExW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
FindResourceExW
ExitThread
GetFileAttributesExW
RtlUnwind
GetSystemDirectoryW
lstrcmpiA
InitializeCriticalSectionEx
VirtualProtect
DuplicateHandle
WaitForSingleObjectEx
Sleep
GetCurrentProcess
SwitchToThread
GetExitCodeThread
FormatMessageW
WideCharToMultiByte
TryEnterCriticalSection
GetStringTypeW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
LocalFree
ReleaseMutex
ReleaseSemaphore
DeleteFileW
CopyFileW
GetFileSizeEx
WriteFile
GetVersionExW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
InterlockedIncrement
InterlockedDecrement
CreateTimerQueue
SignalObjectAndWait
CreateThread
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
WaitForMultipleObjectsEx
WaitNamedPipeW
CreateSemaphoreW
InterlockedCompareExchange
FreeResource
GetSystemWindowsDirectoryW
lstrcmpA
DecodePointer
user32
PostQuitMessage
RegisterWindowMessageW
LoadCursorW
wsprintfW
PostThreadMessageW
SetTimer
KillTimer
CallWindowProcW
FindWindowW
SetWindowLongW
CharNextW
ShowWindow
DestroyWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
FindWindowExW
DefWindowProcW
SendMessageTimeoutW
SendMessageW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
UnregisterClassW
PostMessageW
GetWindowLongW
advapi32
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegGetValueW
RegQueryValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoCreateGuid
CoInitialize
oleaut32
VarUI4FromStr
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathAppendW
PathCombineW
PathIsDirectoryW
SHSetValueA
SHGetValueA
StrCmpIW
StrTrimA
StrCmpNIW
StrStrIA
PathRenameExtensionW
StrStrIW
SHGetValueW
PathFileExistsW
SHSetValueW
comctl32
InitCommonControlsEx
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
crypt32
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
Sections
.text Size: 678KB - Virtual size: 677KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 424KB - Virtual size: 423KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 105KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE