D:\Projects\WinRAR\SFX\build\sfxrar64\Release\sfxrar.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ec9f0c246792fc07885b9a30698de7efcdb5016a2d357d84a46c1c8330b61391.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec9f0c246792fc07885b9a30698de7efcdb5016a2d357d84a46c1c8330b61391.exe
Resource
win10v2004-20250217-en
General
-
Target
ec9f0c246792fc07885b9a30698de7efcdb5016a2d357d84a46c1c8330b61391
-
Size
596KB
-
MD5
72ca46638bb4878f9d947b40a500e3e3
-
SHA1
50f3c40d05ec5a1d05248823a6dfac066543cce8
-
SHA256
ec9f0c246792fc07885b9a30698de7efcdb5016a2d357d84a46c1c8330b61391
-
SHA512
c93612afb7a6f20bbf9a4f386a349998d935f2c181fdde40aef196db6a7902c521204e36cbba0655540d2cd80bdeb25c2ceddc67615fb1fde71e621124a1fc5e
-
SSDEEP
12288:lngM8K8P4ElXddah8kyDIZJ1a+oKl9Qu3JS:lngHKYfXTkXy0ZJ1a/693g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec9f0c246792fc07885b9a30698de7efcdb5016a2d357d84a46c1c8330b61391
Files
-
ec9f0c246792fc07885b9a30698de7efcdb5016a2d357d84a46c1c8330b61391.exe windows:6 windows x64 arch:x64
7e0a0e8f80bbd1a9c0078e57256f1c3d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
CreateFileW
ReadFile
WriteFile
CloseHandle
GetLastError
ConnectNamedPipe
DisconnectNamedPipe
PeekNamedPipe
CreateNamedPipeW
WaitNamedPipeW
GetOverlappedResult
WaitForSingleObject
CreateEventW
SetLastError
LocalFree
FormatMessageW
DeleteFileW
RemoveDirectoryW
SetFileTime
DeviceIoControl
CreateHardLinkW
GetLongPathNameW
GetShortPathNameW
MoveFileW
GetStdHandle
FlushFileBuffers
GetFileType
SetEndOfFile
SetFilePointer
CreateDirectoryW
GetFileAttributesW
SetFileAttributesW
GetCurrentProcessId
FindClose
FindFirstFileW
FindNextFileW
GetVersionExW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFullPathNameW
GetModuleFileNameW
FoldStringW
GetModuleHandleW
FindResourceW
FreeLibrary
GetProcAddress
ExpandEnvironmentStringsW
Sleep
GetCurrentProcess
ExitProcess
GetSystemDirectoryW
LoadLibraryW
SetThreadExecutionState
CompareStringW
AllocConsole
FreeConsole
AttachConsole
WriteConsoleW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
CreateSemaphoreW
CreateThread
SetThreadPriority
GetProcessAffinityMask
GetSystemTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
SystemTimeToFileTime
MultiByteToWideChar
WideCharToMultiByte
GetCPInfo
IsDBCSLeadByte
GlobalAlloc
GlobalMemoryStatusEx
LoadResource
LockResource
SizeofResource
GlobalUnlock
GlobalLock
GlobalFree
GetDateFormatW
GetTimeFormatW
GetCommandLineW
SetEnvironmentVariableW
GetTempPathW
GetExitCodeProcess
GetLocalTime
GetTickCount
MoveFileExW
GetLocaleInfoW
GetNumberFormatW
GetConsoleMode
GetConsoleOutputCP
HeapSize
SetFilePointerEx
GetStringTypeW
SetStdHandle
GetProcessHeap
LCMapStringW
FlsFree
FlsSetValue
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
RtlUnwindEx
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
QueryPerformanceFrequency
GetModuleHandleExW
HeapFree
HeapAlloc
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
oleaut32
SysAllocString
SysFreeString
VariantClear
gdiplus
GdipCloneImage
GdipFree
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdiplusShutdown
GdipAlloc
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ