D:\SoftPatch\src\SoftPatch\SoftAppInstall\Debug\SoftInjectInstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
72b8f9d5bfe9438e099513ed1550b7508d95e1a061c9d7f5602eaa922bb86b93.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
72b8f9d5bfe9438e099513ed1550b7508d95e1a061c9d7f5602eaa922bb86b93.exe
Resource
win10v2004-20241007-en
General
-
Target
72b8f9d5bfe9438e099513ed1550b7508d95e1a061c9d7f5602eaa922bb86b93
-
Size
890KB
-
MD5
a6f8875d950b1a4d13a147a954772f86
-
SHA1
edb921d6c03daa50d4ac177e28b8485af7b2ccb0
-
SHA256
72b8f9d5bfe9438e099513ed1550b7508d95e1a061c9d7f5602eaa922bb86b93
-
SHA512
09bcd7e93b6489e07b3db0091fdbe4e5e5fa27ba96a54e77847a8968dc508d1031e8e1d414ad2f7251fa8932f556ad1d4fcd2170dc846092fafd48ed128ac875
-
SSDEEP
12288:aEeMpVyB2YMii+uuHk6KUTWXQ5JaCO5D46eHeS8WlBz8u+eR7l+:aEpbO2lqWXQ5JaCO5D7Clp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72b8f9d5bfe9438e099513ed1550b7508d95e1a061c9d7f5602eaa922bb86b93
Files
-
72b8f9d5bfe9438e099513ed1550b7508d95e1a061c9d7f5602eaa922bb86b93.exe windows:6 windows x86 arch:x86
cedf73f245f65ad041678114b2e7d72c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
GetShortPathNameA
MultiByteToWideChar
GetModuleHandleA
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateFileW
GetModuleFileNameA
FreeLibrary
GetSystemDirectoryA
GetCurrentProcess
Sleep
WaitForSingleObject
GetLastError
CloseHandle
OutputDebugStringA
WriteFile
RemoveDirectoryA
ReadFile
FindNextFileA
FindFirstFileA
FindClose
DeleteFileA
WideCharToMultiByte
CreateFileA
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
IsDebuggerPresent
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
GetModuleHandleW
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetStdHandle
ExitProcess
GetCommandLineA
GetCommandLineW
HeapValidate
GetSystemInfo
GetCurrentThread
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
OutputDebugStringW
WriteConsoleW
SetConsoleCtrlHandler
CreateDirectoryW
GetFileAttributesExW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
HeapReAlloc
HeapSize
HeapQueryInformation
FlushFileBuffers
GetConsoleOutputCP
DecodePointer
advapi32
StartServiceA
QueryServiceStatus
OpenServiceA
OpenSCManagerA
ControlService
CloseServiceHandle
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
ShellExecuteExA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
Sections
.text Size: 696KB - Virtual size: 695KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 265B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ