launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bb0b7f06064ab683ed79e9f812f5b69a276c96ef4aaf9fb3be1f48d01b409313.exe
Resource
win7-20240903-en
General
-
Target
bb0b7f06064ab683ed79e9f812f5b69a276c96ef4aaf9fb3be1f48d01b409313.zip
-
Size
1.4MB
-
MD5
d1a41da87a1aab0d3517bf266d4e9da7
-
SHA1
6353df72fe6c903543ecbb6efc4856acc3981766
-
SHA256
bb0b7f06064ab683ed79e9f812f5b69a276c96ef4aaf9fb3be1f48d01b409313
-
SHA512
0055547244ddcd22f71e97875b3c27c18221df2efbe7810b5f801818fbce53351d588c2fb0568936990340c9846f85688db8edece62c5a1e4a88b2ef4e60b465
-
SSDEEP
24576:Lokm+usNkCqaeae7bQ8HCM+4fYMsNkCqa5AKu7qageDG6RK1RB+lYsNk8eU+BB:LXmDsNkCqai7bQ8HC94AMsNkCqa5A/7y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb0b7f06064ab683ed79e9f812f5b69a276c96ef4aaf9fb3be1f48d01b409313.zip
Files
-
bb0b7f06064ab683ed79e9f812f5b69a276c96ef4aaf9fb3be1f48d01b409313.zip.exe windows:6 windows x86 arch:x86
Password: infected
4f2cf7d769629b92bca6b6b9e5daec40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameW
GetLongPathNameW
VirtualQuery
LoadLibraryExW
GetCurrentThreadId
VerifyVersionInfoW
VerSetConditionMask
SetUnhandledExceptionFilter
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
CreateProcessW
GetExitCodeProcess
GetModuleHandleW
LoadLibraryA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
FatalAppExitA
ExpandEnvironmentStringsW
lstrcmpW
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryW
LocalAlloc
InterlockedIncrement
InterlockedDecrement
FreeLibrary
InitializeCriticalSection
HeapSize
GetTimeZoneInformation
SetStdHandle
OutputDebugStringW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
GetFileSizeEx
ReadFile
HeapAlloc
GetProcAddress
LoadLibraryW
GetCurrentProcess
TerminateProcess
Process32Next
GetCurrentProcessId
Process32First
FormatMessageW
LocalFree
GetLastError
CreateToolhelp32Snapshot
CreateFileW
Sleep
WaitForSingleObject
CloseHandle
OpenProcess
MultiByteToWideChar
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapFree
WriteConsoleW
GetFileType
WriteFile
GetStdHandle
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
InterlockedExchangeAdd
WideCharToMultiByte
FormatMessageA
GetLocaleInfoEx
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFinalPathNameByHandleW
GetFullPathNameW
SetEndOfFile
SetFileInformationByHandle
SetFilePointerEx
AreFileApisANSI
CopyFileW
GetFileInformationByHandleEx
GetStringTypeW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeCriticalSectionEx
TryEnterCriticalSection
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
GetExitCodeThread
EncodePointer
DecodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
RtlUnwind
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetDriveTypeW
CreateThread
ExitThread
user32
GetWindowThreadProcessId
EnumWindows
GetClassNameW
GetWindowLongW
PostMessageW
DestroyIcon
DispatchMessageW
TranslateMessage
IsDialogMessageW
GetMessageW
LoadImageW
MoveWindow
CreateDialogParamW
EndDialog
FindWindowW
PostQuitMessage
DestroyWindow
ShowWindow
EnableWindow
LoadBitmapW
SetWindowTextW
SetWindowPos
GetSystemMetrics
SetWindowLongW
ScreenToClient
GetWindowRect
SendMessageW
GetClientRect
GetDlgItem
SetDlgItemTextW
MessageBoxW
wsprintfW
IsWindow
FindWindowExW
shell32
SHGetFolderPathW
ShellExecuteExW
advapi32
OpenSCManagerW
RegSetValueExW
RegDeleteKeyValueW
RegGetValueW
RegDeleteKeyW
CloseServiceHandle
DeleteService
QueryServiceStatus
ControlService
OpenServiceW
RegOpenKeyW
RegDeleteValueW
RegQueryValueExW
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyW
RegOpenKeyExW
RegCloseKey
comctl32
ord17
Exports
Exports
NoHotPatch
Sections
.text Size: 406KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 974KB - Virtual size: 974KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ