c:\jenkins\workspace\Client\Client\Windows_VDI\release\Bin\Release\ZoomDocConverter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87.exe
Resource
win10v2004-20241007-en
General
-
Target
918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87.exe
-
Size
5.2MB
-
MD5
c3c8e7b07e16739c1c0b79f5ff91479f
-
SHA1
5de5162c4f4c76a1fbcc281f26a02486f626f29a
-
SHA256
918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87
-
SHA512
cef48c9be82f4db90c68443630d58084aae1aea054bca82803d51ab63226ca085e1c05b393505dd9442c832b1c59e6720ff217d61200ac9011159d145ac33ba4
-
SSDEEP
49152:/IFXei/uNQrNQDuNz6jk+1n+Vu1cJ+TsehmvK718uFvvPRSTp8UX6:/QN8DU6jn+V8/IeIA8u08UX6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87.exe
Files
-
918c574b7b2841d4dfafd36d23940f4b5f9636ccfb483589ff7df63967ddcf87.exe.exe windows:6 windows x86 arch:x86
73fea8e21025ec6f368037fae3afc60a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentThreadId
QueryDosDeviceW
VirtualProtect
HeapFree
EnterCriticalSection
GetCurrentProcess
ReleaseSemaphore
WriteFile
GetModuleFileNameW
WaitForMultipleObjects
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
ResumeThread
GetModuleHandleA
OpenProcess
GetLogicalDriveStringsW
CreateToolhelp32Snapshot
CreateEventW
Process32NextW
CreateFileA
SetEvent
Process32FirstW
FreeLibrary
HeapAlloc
GetWindowsDirectoryW
VerSetConditionMask
GetProcessHeap
GetModuleHandleW
CreateSemaphoreW
FlushInstructionCache
VerifyVersionInfoW
CreateDirectoryA
SetDllDirectoryW
VirtualQuery
LoadLibraryExW
FlushFileBuffers
LocalFree
SetErrorMode
GetPrivateProfileStringW
GetTempFileNameW
CreateFileW
OutputDebugStringW
IsWow64Process
MultiByteToWideChar
SetConsoleCtrlHandler
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
CreateThread
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
GetProcAddress
LoadLibraryW
ExitProcess
DeleteCriticalSection
CloseHandle
DeleteFileW
TerminateThread
GetLastError
GetTickCount64
Sleep
WaitForSingleObject
InitializeCriticalSectionEx
TerminateProcess
CreateDirectoryW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
user32
GetMessageW
GetUserObjectInformationA
SetTimer
TranslateMessage
PostThreadMessageW
DispatchMessageW
GetProcessWindowStation
MessageBoxW
advapi32
GetTokenInformation
RegGetValueW
RegOpenKeyExW
OpenProcessToken
RegEnumKeyExW
RegCloseKey
DuplicateTokenEx
FreeSid
CreateRestrictedToken
ImpersonateLoggedOnUser
CreateWellKnownSid
AllocateAndInitializeSid
SetTokenInformation
RevertToSelf
shell32
SHGetKnownFolderPath
SHGetSpecialFolderPathW
ShellExecuteExW
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoSetProxyBlanket
OleRun
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
shlwapi
PathAppendW
PathIsRelativeW
psapi
GetModuleInformation
GetModuleFileNameExW
GetMappedFileNameW
EnumProcessModules
wintrust
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvCertFromChain
WTHelperGetProvSignerFromChain
crypt32
CertGetNameStringW
Sections
.text Size: 95KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ