D:\jenkins\workspace\pc-2345mpcsafe-build\RhinoProtect\Publish\OutPut\Bin\Win32\release\pdb\2345ScUpgrade.pdb
Static task
static1
Behavioral task
behavioral1
Sample
551982cba1d6db4f1bf89e3dde5d2bc8edd234721898c6a12cabd7abb63070cf.exe
Resource
win7-20240903-en
General
-
Target
551982cba1d6db4f1bf89e3dde5d2bc8edd234721898c6a12cabd7abb63070cf
-
Size
1.8MB
-
MD5
41821e08dd7bb2f8676fe0ed21bd6218
-
SHA1
c8ed1234803720cbc2affe468596b9316697a58e
-
SHA256
551982cba1d6db4f1bf89e3dde5d2bc8edd234721898c6a12cabd7abb63070cf
-
SHA512
d667dba5061e81818d60b9774a49352427e38faee730f7deb4783c5471bb9163199a55b1468a59c9691c3cc7c9c5356497057c6feef8ab983ba6b252bc17465d
-
SSDEEP
49152:Qufc17xhCP0IUjSXXQbMDK5a9owwwwsElfgI2tYA2Tseg7o+Zxw:3c17xhDIU1loI2tFRob
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 551982cba1d6db4f1bf89e3dde5d2bc8edd234721898c6a12cabd7abb63070cf
Files
-
551982cba1d6db4f1bf89e3dde5d2bc8edd234721898c6a12cabd7abb63070cf.exe windows:5 windows x86 arch:x86
df15bf0cdaca3328fa0ee6495a6f5304
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
GetModuleHandleW
GetExitCodeProcess
GetPrivateProfileStringW
InterlockedExchange
SetLastError
InterlockedExchangeAdd
GetTickCount
lstrlenW
GetFileAttributesW
LocalFree
HeapAlloc
WriteConsoleW
HeapSize
SetStdHandle
CreateThread
WaitForSingleObjectEx
OutputDebugStringA
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
OpenProcess
WaitForSingleObject
WaitForMultipleObjects
HeapFree
CreateFileMappingW
FreeLibrary
GetProcAddress
FileTimeToLocalFileTime
LoadLibraryW
FileTimeToSystemTime
GetCurrentThreadId
VirtualQuery
GetLogicalDriveStringsW
GetEnvironmentVariableW
GetModuleFileNameW
QueryDosDeviceW
GetCurrentProcess
CloseHandle
CreateEventW
GetCurrentProcessId
GetLastError
Sleep
GetProcessHeap
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
GetDriveTypeW
FindFirstFileW
GetLongPathNameW
GetShortPathNameW
CreateFileW
GetFileAttributesExW
ExpandEnvironmentStringsW
GetVersionExW
LockResource
GetSystemInfo
LoadResource
FindResourceW
lstrcmpiW
SearchPathW
TerminateProcess
OpenEventW
SetEvent
ResetEvent
GetACP
MultiByteToWideChar
WideCharToMultiByte
GetComputerNameExW
GlobalAlloc
GlobalFree
LoadLibraryA
LoadLibraryExW
GetVolumeInformationW
GetDiskFreeSpaceW
ReadFile
WriteFile
SetFileTime
SetFilePointer
SetEndOfFile
GetFileSize
GetFileTime
FindNextFileW
FindClose
LocalFileTimeToFileTime
SystemTimeToFileTime
GetSystemTime
DosDateTimeToFileTime
FileTimeToDosDateTime
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateDirectoryW
GetFullPathNameW
RemoveDirectoryW
GetTempPathW
GetSystemDirectoryW
SetFileAttributesW
DeleteFileW
GetCurrentDirectoryW
GetWindowsDirectoryW
SetCurrentDirectoryW
CopyFileW
GetTempFileNameW
MoveFileW
FormatMessageW
lstrcatW
lstrcpyW
GetFileSizeEx
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
CreateMutexW
ReleaseMutex
OpenMutexW
DeviceIoControl
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
GetLocalTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
GetStdHandle
GetFileType
OutputDebugStringW
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
SetConsoleCtrlHandler
GetCurrentThread
HeapReAlloc
GetDateFormatW
GetTimeFormatW
IsValidLocale
MoveFileExW
user32
MessageBoxW
GetParent
GetUserObjectInformationW
GetProcessWindowStation
UnregisterClassW
GetWindowThreadProcessId
GetWindowRect
GetFocus
SetWindowPos
GetSystemMetrics
GetShellWindow
WindowFromPoint
AttachThreadInput
GetForegroundWindow
SetFocus
GetClassNameW
GetDesktopWindow
advapi32
ReportEventW
CreateServiceW
QueryServiceStatus
CloseServiceHandle
OpenSCManagerW
ChangeServiceConfig2W
DeleteService
ControlService
StartServiceW
OpenServiceW
LookupPrivilegeValueW
AdjustTokenPrivileges
SetEntriesInAclW
LookupPrivilegeNameW
SetNamedSecurityInfoW
EqualSid
AllocateAndInitializeSid
FreeSid
GetTokenInformation
RegCloseKey
OpenProcessToken
RegOpenKeyW
RegQueryValueExW
DeregisterEventSource
RegisterEventSourceW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHFileOperationW
ole32
CoCreateInstance
psapi
GetProcessImageFileNameW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE