D:\Jenkins\.jenkins\workspace\master_lu\benchmark_launcher\benchmark_launcher\Release\BenchmarkLauncher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
22f2a68aa960fbc9951119281ef7d1520721f8cc8fa0d32017dcff8a818b7889.exe
Resource
win7-20240903-en
General
-
Target
22f2a68aa960fbc9951119281ef7d1520721f8cc8fa0d32017dcff8a818b7889
-
Size
1.2MB
-
MD5
52e2cba0f4fe3f4ed247e3898604ffb6
-
SHA1
c6a99300eba92ed26395d437565d6ca4515ce2eb
-
SHA256
22f2a68aa960fbc9951119281ef7d1520721f8cc8fa0d32017dcff8a818b7889
-
SHA512
fe7ba2769d2d9ab2b0f679a34f58fa83cadf48cee285ce03d0c4e12f8a7a824ff5e962f9d84158506e8aa806edbdfc14e0042f93a26ffc002912f3ca3e1a92cf
-
SSDEEP
24576:2ZAkewtgLOHeZNCmgcPov8MkBuYA0e12YFhcirEU:i4j6+ZNC6jBX62YFbEU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22f2a68aa960fbc9951119281ef7d1520721f8cc8fa0d32017dcff8a818b7889
Files
-
22f2a68aa960fbc9951119281ef7d1520721f8cc8fa0d32017dcff8a818b7889.exe windows:5 windows x86 arch:x86
1f8c7dbc2d7295fb708fe5c30f14203b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RaiseException
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
GetTickCount
CreateEventW
GetProcAddress
GetCommandLineW
SetCurrentDirectoryW
WideCharToMultiByte
CreateThread
TerminateThread
Sleep
LoadLibraryW
FindClose
RemoveDirectoryW
SetFileAttributesW
GetFileAttributesW
DeleteFileW
FindFirstFileW
FindNextFileW
GetSystemInfo
GetModuleHandleW
DecodePointer
InterlockedIncrement
InterlockedDecrement
FreeLibrary
GetCurrentProcess
SetProcessPriorityBoost
SetLastError
lstrcmpiW
LoadLibraryExW
SetPriorityClass
GetSystemDirectoryW
VirtualProtect
SetUnhandledExceptionFilter
IsBadReadPtr
InterlockedCompareExchange
InterlockedExchange
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MultiByteToWideChar
GetModuleFileNameW
CreateMutexW
CloseHandle
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
FindFirstFileExA
WriteConsoleW
ReadConsoleW
SetEndOfFile
SetStdHandle
SetConsoleCtrlHandler
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetCurrentThread
GetACP
InitializeCriticalSection
GetLastError
GetCurrentProcessId
OpenProcess
GetLongPathNameW
FindResourceExW
FindResourceW
SizeofResource
LoadResource
GetStdHandle
GetModuleFileNameA
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
GetFileAttributesExW
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
InterlockedFlushSList
RtlUnwind
FlushFileBuffers
ResetEvent
GetFileSize
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
GetProcessHeap
HeapSize
UnhandledExceptionFilter
GetTempPathW
FindNextFileA
FindFirstFileA
WriteFile
CopyFileW
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
LocalFree
LockResource
ReleaseMutex
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryExA
GetVersionExW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
OpenFileMappingW
GetFileSizeEx
ReadFile
SetFilePointer
CreateFileW
GetStringTypeW
FormatMessageW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
user32
SetForegroundWindow
FindWindowExW
IsWindow
IsIconic
IsWindowVisible
ShowWindow
GetWindowThreadProcessId
SendMessageW
KillTimer
SetTimer
CallWindowProcW
PostQuitMessage
PostMessageW
SendMessageTimeoutW
LoadCursorW
SetWindowLongW
CharNextW
DestroyWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
DefWindowProcW
PeekMessageW
DispatchMessageW
TranslateMessage
GetMessageW
UnregisterClassW
EnumDisplaySettingsW
ChangeDisplaySettingsW
wsprintfW
FindWindowW
GetWindowLongW
GetSystemMetrics
advapi32
CryptSetKeyParam
CryptDecrypt
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
RegGetValueW
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
CryptContextAddRef
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExW
SHCreateDirectoryExW
CommandLineToArgvW
ole32
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
shlwapi
PathAddBackslashW
PathCombineW
StrStrIW
PathFileExistsW
PathAppendW
PathFindFileNameW
PathAppendA
PathIsDirectoryW
PathIsRelativeW
PathIsRootW
StrStrIA
PathRemoveFileSpecW
comctl32
InitCommonControlsEx
psapi
GetModuleFileNameExW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
crypt32
CryptStringToBinaryA
CryptStringToBinaryW
CryptBinaryToStringA
CryptBinaryToStringW
CertGetNameStringW
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
urlmon
URLDownloadToCacheFileW
Sections
.text Size: 880KB - Virtual size: 879KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 14KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 110KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE