D:\jenkins\workspace\pc-2345mpcsafe-build\RhinoProtect\Publish\OutPut\Bin\Win32\release\pdb\2345ScUpgrade.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d4a1d3dd8c9091068f9227aaa435da74a871af1da4164dc5f91d934fc3b32bd7.exe
Resource
win7-20240903-en
General
-
Target
d4a1d3dd8c9091068f9227aaa435da74a871af1da4164dc5f91d934fc3b32bd7
-
Size
1.8MB
-
MD5
b186b8142860215e1620ed51e82ab351
-
SHA1
133a0e6dde13d71f1a4119e2b61671798fd4ae6f
-
SHA256
d4a1d3dd8c9091068f9227aaa435da74a871af1da4164dc5f91d934fc3b32bd7
-
SHA512
df7699c70077cbfc4c1670bdd03537165aa97df078e772b85b19de5769e3f38f387c4b4a80102c1de9bc836987c18f8fbbd5c4fa18d07aa442892dcd436288e3
-
SSDEEP
49152:z+UrfhixCmnGLgj1yzHwnzvt/wwwwsG378E1HuiTGUWU0rRb3az:z+Urfhtmnn3wE1+z8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4a1d3dd8c9091068f9227aaa435da74a871af1da4164dc5f91d934fc3b32bd7
Files
-
d4a1d3dd8c9091068f9227aaa435da74a871af1da4164dc5f91d934fc3b32bd7.exe windows:5 windows x86 arch:x86
df15bf0cdaca3328fa0ee6495a6f5304
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
GetModuleHandleW
GetExitCodeProcess
GetPrivateProfileStringW
InterlockedExchange
SetLastError
InterlockedExchangeAdd
GetTickCount
lstrlenW
GetFileAttributesW
LocalFree
HeapAlloc
WriteConsoleW
HeapSize
SetStdHandle
CreateThread
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
OpenProcess
WaitForSingleObject
WaitForMultipleObjects
HeapFree
CreateFileMappingW
FreeLibrary
GetProcAddress
FileTimeToLocalFileTime
LoadLibraryW
FileTimeToSystemTime
GetCurrentThreadId
VirtualQuery
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetModuleFileNameW
QueryDosDeviceW
GetCurrentProcess
CloseHandle
CreateEventW
GetCurrentProcessId
GetLastError
Sleep
GetProcessHeap
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
GetDriveTypeW
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
CreateFileW
GetFileAttributesExW
ExpandEnvironmentStringsW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
SearchPathW
TerminateProcess
OpenEventW
SetEvent
ResetEvent
GetACP
MultiByteToWideChar
WideCharToMultiByte
GetComputerNameExW
GlobalAlloc
GlobalFree
LoadLibraryA
LoadLibraryExW
GetVolumeInformationW
GetDiskFreeSpaceW
ReadFile
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
FindNextFileW
FindClose
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
GetSystemDirectoryW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
FormatMessageW
lstrcatW
lstrcpyW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
CreateMutexW
ReleaseMutex
OpenMutexW
DeviceIoControl
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
GetLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
GetStdHandle
GetFileType
OutputDebugStringW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
HeapReAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
MoveFileExW
user32
MessageBoxW
GetParent
GetUserObjectInformationW
GetProcessWindowStation
UnregisterClassW
GetWindowThreadProcessId
GetWindowRect
GetFocus
SetWindowPos
GetSystemMetrics
GetShellWindow
WindowFromPoint
AttachThreadInput
GetForegroundWindow
SetFocus
GetClassNameW
GetDesktopWindow
advapi32
ReportEventW
CreateServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
ChangeServiceConfig2W
DeleteService
ControlService
StartServiceW
OpenServiceW
LookupPrivilegeValueW
AdjustTokenPrivileges
SetEntriesInAclW
LookupPrivilegeNameW
SetNamedSecurityInfoW
EqualSid
AllocateAndInitializeSid
FreeSid
GetTokenInformation
RegCloseKey
OpenProcessToken
RegOpenKeyW
RegQueryValueExW
DeregisterEventSource
RegisterEventSourceW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHFileOperationW
ole32
CoCreateInstance
psapi
GetProcessImageFileNameW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 124KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE