c:\Dream\Bird\Branch\Hard\Fresh\boat\Arrangereceive.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a3ca02fdfe8d0ff9fe4f284d4700fd85c6fcff458bf7460ae0b23aa1c1c60ccc.exe
Resource
win7-20241010-en
General
-
Target
a3ca02fdfe8d0ff9fe4f284d4700fd85c6fcff458bf7460ae0b23aa1c1c60ccc.exe
-
Size
1.2MB
-
MD5
00d5ae7f7fc3f77ab69da2f9c757f960
-
SHA1
9794125c9cf362328cff5988dc7af803f38499bd
-
SHA256
a3ca02fdfe8d0ff9fe4f284d4700fd85c6fcff458bf7460ae0b23aa1c1c60ccc
-
SHA512
9b4b6567b9d5fa67c82383734ca820123267ac330136acaa4fb6d7291890465685cedd5153a5916c6fedc7a2ba3e25c06a860225610cfccfe27fb96e10bac6ec
-
SSDEEP
12288:qNyahrrcXVFaXQM265f8IHj+GAULolYCbUhVGOYLG72fERatPKd1rhGSZst/tpxw:q04kuCgsSYhEo3hfZkiZabwXO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3ca02fdfe8d0ff9fe4f284d4700fd85c6fcff458bf7460ae0b23aa1c1c60ccc.exe
Files
-
a3ca02fdfe8d0ff9fe4f284d4700fd85c6fcff458bf7460ae0b23aa1c1c60ccc.exe.exe windows:5 windows x86 arch:x86
023669644ee2c1c585027d2e0c96ead0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ResetEvent
VirtualFree
VirtualProtect
VirtualAlloc
GetProcAddress
GetProfileSectionW
GetWindowsDirectoryW
GetCurrentDirectoryW
MultiByteToWideChar
LCMapStringW
IsProcessorFeaturePresent
CopyFileW
HeapAlloc
HeapSize
WideCharToMultiByte
RtlUnwind
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapFree
LoadLibraryW
CreateDirectoryW
EnterCriticalSection
InitializeCriticalSection
GetModuleHandleW
GetVersion
GetVolumeInformationW
FileTimeToLocalFileTime
CreateEventW
GetTickCount
DeleteFileW
GetStartupInfoW
CloseHandle
CreateProcessW
HeapReAlloc
Sleep
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStringTypeW
HeapCreate
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
GetCommandLineW
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
RegisterWindowMessageW
TranslateMessage
CreateMenu
DeferWindowPos
BeginDeferWindowPos
SetForegroundWindow
CheckRadioButton
SendDlgItemMessageW
IsClipboardFormatAvailable
SendMessageW
IsDialogMessageW
LoadBitmapW
SetWindowTextW
GetIconInfo
SetClipboardData
gdi32
GetTextExtentPoint32W
SetPixel
StretchBlt
SelectObject
PatBlt
comctl32
ImageList_DragLeave
ImageList_ReplaceIcon
ImageList_DragShowNolock
comdlg32
ChooseColorW
GetFileTitleW
GetSaveFileNameW
GetOpenFileNameW
ole32
CoRegisterClassObject
CoUninitialize
CoTaskMemFree
CoInitialize
CoRegisterSurrogate
CoTaskMemAlloc
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
shlwapi
PathAppendW
PathAddBackslashW
PathFindFileNameW
PathStripToRootW
Sections
.text Size: 512KB - Virtual size: 511KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 679KB - Virtual size: 679KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ