H:\flow\reproductivity\act\scripts.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3d8db2fcb6c50c60ee615951ed706a2a9db2faf92795ffb7c76fe2d4e5ac5b5f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3d8db2fcb6c50c60ee615951ed706a2a9db2faf92795ffb7c76fe2d4e5ac5b5f.exe
Resource
win10v2004-20241007-en
General
-
Target
3d8db2fcb6c50c60ee615951ed706a2a9db2faf92795ffb7c76fe2d4e5ac5b5f.exe
-
Size
279KB
-
MD5
4fc46aab1d1c00ecc7ffc2bbe8619eec
-
SHA1
565d03edbecdd968c29239ef4ab3169b2aae997f
-
SHA256
3d8db2fcb6c50c60ee615951ed706a2a9db2faf92795ffb7c76fe2d4e5ac5b5f
-
SHA512
de57ba2dadcdefb91e1e9972c7b8d19bdff3a1b6f8d3640d4d837910e4838d7d69cbd3d88cbc6118f78e8d719234f2fa9e80f4580de64748eb93eadd9571ecb3
-
SSDEEP
6144:lVKZvIlQ0wfwcl1xMZMlIYwv4IkLXQP2Mds:lVKmG0lA1xMeiYwwIvjds
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d8db2fcb6c50c60ee615951ed706a2a9db2faf92795ffb7c76fe2d4e5ac5b5f.exe
Files
-
3d8db2fcb6c50c60ee615951ed706a2a9db2faf92795ffb7c76fe2d4e5ac5b5f.exe.exe windows:5 windows x86 arch:x86
c1d23702d33f22505f27f8151fe0a92b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
PDB Paths
Imports
kernel32
GetStringTypeW
HeapFree
HeapQueryInformation
HeapSize
HeapReAlloc
OutputDebugStringW
WriteConsoleW
OutputDebugStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
IsProcessorFeaturePresent
LoadLibraryW
WriteFile
GetEnvironmentStringsW
GetModuleFileNameA
GetTickCount
QueryPerformanceCounter
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
LeaveCriticalSection
InterlockedDecrement
SetLastError
GetModuleHandleW
GetProcAddress
TlsFree
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
ReadFile
FreeLibrary
VirtualQuery
SetStdHandle
FlushFileBuffers
CreateFileW
CloseHandle
DecodePointer
RaiseException
lstrcpyA
GetCurrentProcessId
GetModuleHandleA
GetLastError
HeapCreate
CreateEventA
InitializeCriticalSection
FormatMessageA
GetProcessHeap
FreeEnvironmentStringsW
WaitForSingleObject
IsValidCodePage
GetCPInfo
GetOEMCP
GetACP
InterlockedIncrement
LCMapStringW
IsBadReadPtr
HeapValidate
EncodePointer
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineA
GetSystemTimeAsFileTime
CreateDirectoryA
GetModuleFileNameW
IsDebuggerPresent
SetUnhandledExceptionFilter
LocalFree
UnhandledExceptionFilter
GetCurrentProcess
HeapAlloc
EnterCriticalSection
ExitProcess
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
TerminateProcess
user32
UnregisterClassA
GetWindow
ActivateKeyboardLayout
CheckMenuItem
DestroyIcon
DialogBoxParamA
LoadCursorA
EndPaint
DestroyWindow
InsertMenuItemA
RegisterClassExA
PostQuitMessage
LoadBitmapA
GetParent
LoadIconA
DefFrameProcA
wsprintfA
GetClientRect
CreateMenu
SendMessageA
BeginPaint
GetDC
UpdateWindow
GetWindowTextA
GetWindowLongA
CreateWindowExA
ReleaseDC
EnableMenuItem
GetDlgItem
EndDialog
DefWindowProcA
ShowWindow
SetMenu
CreatePopupMenu
GetSysColorBrush
IsDlgButtonChecked
DrawMenuBar
AppendMenuA
IsWindow
CreateWindowExW
CheckRadioButton
AllowSetForegroundWindow
SetWindowTextA
LoadImageA
gdi32
GetTextExtentPoint32A
DeleteDC
CreateFontA
GetDeviceCaps
CreateFontIndirectA
CreateBitmap
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
GdiSetBatchLimit
Ellipse
SaveDC
CreateRectRgn
GetObjectA
GetStockObject
RestoreDC
CreateSolidBrush
EnumFontsA
TextOutA
BitBlt
shell32
SHGetFolderPathA
ole32
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoInitializeSecurity
CoInitializeEx
oleaut32
SysFreeString
VariantChangeType
VariantClear
SysStringLen
SysAllocString
VariantInit
ws2_32
htons
socket
mpr
WNetConnectionDialog
shlwapi
PathCompactPathA
comctl32
InitCommonControlsEx
ImageList_ReplaceIcon
oleacc
CreateStdAccessibleProxyA
Sections
.text Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ