D:\Jenkins\.jenkins\workspace\MGame\SuperBookmark\SuprBookmark_Tray\Release\SuperBookmarkTray.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e2c9e7cbb06f062c20569e55b03b36e4ebf6d662dceb7871fdbf515953dbaf05.exe
Resource
win7-20241023-en
General
-
Target
e2c9e7cbb06f062c20569e55b03b36e4ebf6d662dceb7871fdbf515953dbaf05
-
Size
547KB
-
MD5
dcc6a3a889579111aa7a3bcd6e01bc8a
-
SHA1
393c7de69fc973d40551f48cba07756d2201269d
-
SHA256
e2c9e7cbb06f062c20569e55b03b36e4ebf6d662dceb7871fdbf515953dbaf05
-
SHA512
73ecb166c93d77a309eced2cea56b88417990fe06dcd5718b1d719d7a8f2a68b357cf77a43a8442550febfcd1d68503508c0424c23427eef7cf4d33850563d62
-
SSDEEP
12288:JOi58WE9JCW7S86Qlh+Wh39YFfQbFJjdhq0QJtb+bNH4Sn:JoWeCW7SjvjN8L3qJpevn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2c9e7cbb06f062c20569e55b03b36e4ebf6d662dceb7871fdbf515953dbaf05
Files
-
e2c9e7cbb06f062c20569e55b03b36e4ebf6d662dceb7871fdbf515953dbaf05.exe windows:6 windows x86 arch:x86
b55b66ea80a25a47d028a5ec0e554861
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualProtect
GetModuleFileNameW
WaitForSingleObject
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
IsBadReadPtr
SetUnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateMutexW
Sleep
LoadLibraryExW
ReleaseMutex
CreateEventW
SetEvent
ReadFile
WriteFile
CreateFileW
SystemTimeToFileTime
GetCommandLineW
GetTickCount
OpenProcess
CreateToolhelp32Snapshot
GetTickCount64
Process32NextW
Process32FirstW
GetProcessTimes
WideCharToMultiByte
CopyFileW
DeleteAtom
FindAtomW
AddAtomW
GetStartupInfoW
lstrcpynW
TerminateProcess
GetProcessId
GetVersionExW
GetCurrentThread
CreateProcessW
GetExitCodeProcess
lstrlenW
FindNextFileW
GetFullPathNameW
SetLastError
FindFirstFileW
GetModuleHandleW
GetShortPathNameW
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
DeleteFileW
FindFirstFileExW
ReadConsoleW
SetEndOfFile
SetStdHandle
EnumSystemLocalesW
GetCurrentProcess
GetPrivateProfileStringW
GetPrivateProfileIntW
WritePrivateProfileStringW
lstrcmpiW
MultiByteToWideChar
FreeLibrary
GetProcessHeap
DeleteCriticalSection
GetProcAddress
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
FindResourceExW
LoadLibraryW
RaiseException
HeapReAlloc
LockResource
GetLastError
HeapSize
InitializeCriticalSectionEx
HeapFree
SizeofResource
GetUserDefaultLCID
IsValidLocale
GetACP
GetStdHandle
ExitProcess
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
SetFilePointerEx
GetFileType
QueryPerformanceFrequency
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
GetFileAttributesExW
RtlUnwind
FlushFileBuffers
lstrcmpA
DeviceIoControl
FreeResource
GetSystemWindowsDirectoryW
QueryPerformanceCounter
UnhandledExceptionFilter
lstrcpyW
LocalFree
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SwitchToThread
InitializeCriticalSectionAndSpinCount
GetStringTypeW
FormatMessageW
LoadLibraryExA
FindClose
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
IsDebuggerPresent
OutputDebugStringW
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
user32
UnregisterClassW
PostMessageW
RegisterWindowMessageW
TranslateMessage
CharNextW
PeekMessageW
RegisterClassExW
DispatchMessageW
DefWindowProcW
wsprintfW
GetMessageW
GetClassInfoExW
KillTimer
SetWindowLongW
LoadCursorW
GetWindowThreadProcessId
GetShellWindow
PostQuitMessage
GetWindowLongW
CallWindowProcW
DestroyWindow
CreateWindowExW
SetTimer
IsWindow
advapi32
QueryServiceStatus
EqualSid
CloseServiceHandle
OpenSCManagerW
AllocateAndInitializeSid
FreeSid
OpenServiceW
DuplicateTokenEx
OpenThreadToken
GetTokenInformation
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryInfoKeyW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
OpenProcessToken
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
shell32
ShellExecuteExW
ord680
SHCreateDirectoryExW
ShellExecuteW
SHGetSpecialFolderPathW
SHFileOperationW
ord165
ole32
CoCreateGuid
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
VarUI4FromStr
shlwapi
PathFileExistsW
PathRemoveFileSpecW
StrStrIW
PathCombineW
SHSetValueW
PathAppendW
StrCpyW
StrCmpNIW
StrTrimA
StrStrIA
wnsprintfW
StrCmpIW
comctl32
InitCommonControlsEx
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
Sections
.text Size: 330KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 89KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE