reg.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7f8fd32e99e00368666246cf105c202ee95a6ff3b53e5925bb107e9511936f38.exe
Resource
win7-20240903-en
General
-
Target
7f8fd32e99e00368666246cf105c202ee95a6ff3b53e5925bb107e9511936f38
-
Size
135KB
-
MD5
5baa38248cf4c3f2731028b8660e2537
-
SHA1
4b018806834e0585a4840b282175f4754319be1f
-
SHA256
7f8fd32e99e00368666246cf105c202ee95a6ff3b53e5925bb107e9511936f38
-
SHA512
ab1314bb9b629e7755813dea97266006e3f3f3ce2ec86af38b688e5c7332f323efc1a06d80c5a970a94ee234faeb899f7340644bcebfd39fff36c4531b4ea529
-
SSDEEP
3072:q6goK0+7l2bSrUr2lQBV+UdE+rECWp7hKU:G0+J2bcUvBV+UdvrEFp7hKU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7f8fd32e99e00368666246cf105c202ee95a6ff3b53e5925bb107e9511936f38
Files
-
7f8fd32e99e00368666246cf105c202ee95a6ff3b53e5925bb107e9511936f38.exe windows:6 windows x86 arch:x86
1140a04006e64e611073810161435792
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyW
RegConnectRegistryW
RegCloseKey
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
OpenProcessToken
RegRestoreKeyW
RegSaveKeyW
LookupPrivilegeValueW
RegSaveKeyExW
AdjustTokenPrivileges
RegLoadKeyW
RegUnLoadKeyW
RegGetValueW
RegDeleteKeyExW
RegDeleteValueW
RegEnumKeyW
RegSetValueExA
RegSetValueW
RegFlushKey
kernel32
GetTempFileNameW
GetTempPathW
GetLastError
SetLastError
DeleteFileW
LocalFree
GetCurrentProcess
CopyFileW
CloseHandle
CreateFileW
GetFileSize
SearchPathW
SetFilePointer
OutputDebugStringW
WriteFile
WideCharToMultiByte
LocalReAlloc
ReadFile
lstrcmpW
MultiByteToWideChar
lstrlenW
LocalAlloc
HeapSize
HeapReAlloc
HeapAlloc
HeapValidate
HeapFree
GetProcessHeap
GetConsoleOutputCP
ExitProcess
WriteConsoleW
GetThreadLocale
CompareStringW
GetStdHandle
GetConsoleMode
GetFileType
FormatMessageW
SetThreadUILanguage
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
Sleep
msvcrt
wcstoul
_fileno
_get_osfhandle
fprintf
_except_handler4_common
_controlfp
?terminate@@YAXXZ
_initterm
__p__fmode
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
_vsnwprintf
_resetstkoflw
_wcstoui64
_errno
fgetwc
fflush
__iob_func
__setusermatherr
_memicmp
wcstol
memset
ntdll
NtSetInformationKey
NtQueryKey
user32
IsCharAlphaNumericW
CharNextW
LoadStringW
CharUpperW
ws2_32
WSACleanup
shlwapi
StrChrIW
StrStrIW
StrDupW
StrChrW
StrToIntW
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 257KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ