C:\Users\damia\Documents\Thorium\Release\Thorium.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Thorium.exe
Resource
win11-20250410-en
General
-
Target
Thorium.exe
-
Size
302KB
-
MD5
4a94c74790129bc41d75fe0c1bf5f351
-
SHA1
a5540af8fbaad2656afb3a7b76c42a50b5bbc366
-
SHA256
1fb147e3aaf58a990e163b1f14d80130a9817f8fcfa53a34ba48e983136b1e50
-
SHA512
9787fe4cffeaf150845cfe989aa6eac504cfa00d4911d7069be5fb3dca6052531b5cfafe1734b288856818e11cd331345f5f884477f566e23aa6ddf94ad8fc07
-
SSDEEP
3072:zKhJM9JdZ5usnvivd9vN3LaRHVbe7ufTxrr++U/e8mmmmmmmmmmmmmmmmmmmmmmR:zKE51nvivXvEVRUdzWE3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Thorium.exe
Files
-
Thorium.exe.exe windows:6 windows x86 arch:x86
0a2b11c5ab8f2d0ffcba081f7f858b92
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleW
CopyFileW
CreateProcessW
CreateFileW
ReadConsoleW
ReadFile
GetConsoleMode
GetCurrentProcessId
ReadProcessMemory
ExitProcess
LocalFree
GetProcAddress
GetWindowsDirectoryW
CreateThread
CloseHandle
Process32FirstW
GetCurrentThread
Process32NextW
Sleep
CreateToolhelp32Snapshot
SetFileAttributesW
OpenProcess
GetFileAttributesW
LocalAlloc
WaitForSingleObject
GetModuleFileNameW
GetCurrentProcess
HeapCreate
WriteConsoleW
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
GetStringTypeW
GetCurrentThreadId
WaitForSingleObjectEx
GetExitCodeThread
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
WakeAllConditionVariable
QueryPerformanceCounter
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
DuplicateHandle
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetStdHandle
WriteFile
HeapAlloc
HeapFree
GetFileAttributesExW
CreatePipe
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
VirtualProtect
CompareStringW
LCMapStringW
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
DecodePointer
user32
MessageBoxW
GetDC
GetSystemMetrics
gdi32
CreateDIBSection
CreateCompatibleDC
StretchBlt
CreateSolidBrush
SelectObject
advapi32
RevertToSelf
RegCloseKey
EqualSid
CreateProcessWithTokenW
RegEnumKeyExW
ImpersonateLoggedOnUser
RegSetValueExW
OpenProcessToken
RegOpenKeyExW
RegCreateKeyW
ConvertStringSidToSidA
OpenThreadToken
RegEnumValueW
GetTokenInformation
ole32
CoInitializeEx
CoGetObject
CoUninitialize
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fptable Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ