wmlaunch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7abd35340d64b6c0ee3d7c4f5bd4fe39.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7abd35340d64b6c0ee3d7c4f5bd4fe39.exe
Resource
win10v2004-20231215-en
General
-
Target
7abd35340d64b6c0ee3d7c4f5bd4fe39
-
Size
284KB
-
MD5
7abd35340d64b6c0ee3d7c4f5bd4fe39
-
SHA1
ad48b379da7d229e6c54a1c9583417b1eade2074
-
SHA256
59982661f804ebf7c12c5bc83c7bc46081f0e0a9394570c889f7793f962c70d8
-
SHA512
5a2b689654af74b8b13fd29028c6b5fa88f15767b4a1e07d7662e8676eab50224a283cf41245e271c698d5ae47a96ba40d19ed8d6ceff47ceae9247d46ae1df2
-
SSDEEP
3072:MHbhq0/DxDRoVrGSjpqZPDI0EY5mU9YzBzxBaxfp3yvIEzwBODU4588QxG7:M7h53RalU1bEMBkSxY7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7abd35340d64b6c0ee3d7c4f5bd4fe39
Files
-
7abd35340d64b6c0ee3d7c4f5bd4fe39.exe windows:6 windows x64 arch:x64
5dfbfc13a5c10c08154762ccbde7bd5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegSetValueExW
TraceMessage
RegQueryValueExW
kernel32
SetEvent
CloseHandle
GetVersion
QueryDosDeviceW
GetDriveTypeW
DebugBreak
DeviceIoControl
GetWindowsDirectoryW
CreateFileW
CreateThread
SetErrorMode
GetFileAttributesW
GetExitCodeThread
SetLastError
LeaveCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
CompareStringW
WideCharToMultiByte
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
lstrlenA
VirtualQuery
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
WaitForSingleObject
GetModuleHandleW
InitializeCriticalSection
LoadLibraryW
SizeofResource
GetVersionExW
HeapDestroy
lstrcpynW
GetModuleFileNameW
MultiByteToWideChar
lstrlenW
GetLastError
GetProcAddress
VirtualAlloc
CreateEventW
GetSystemInfo
lstrcmpiW
lstrcatW
VirtualProtect
DeleteCriticalSection
user32
CharNextW
CharPrevW
msvcrt
??_V@YAXPEAX@Z
malloc
free
_wcmdln
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
wcspbrk
_vsnwprintf
_purecall
iswspace
wcsncmp
towupper
_wtol
iswdigit
_wcsicmp
bsearch
_beginthreadex
_wtoi
memset
memcpy
??3@YAXPEAX@Z
realloc
??2@YAPEAX_K@Z
__wgetmainargs
__C_specific_handler
_XcptFilter
_exit
_cexit
exit
wcschr
towlower
memmove
??_U@YAPEAX_K@Z
_wcsnicmp
wcsrchr
wcsstr
memcmp
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
mpr
WNetGetConnectionW
WNetCancelConnection2W
WNetAddConnection2W
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoUninitialize
PropVariantClear
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
SysAllocString
VarUI4FromStr
SysFreeString
shell32
ShellExecuteExW
shlwapi
PathGetCharTypeW
ord158
mf
MFGetSupportedSchemes
Sections
.text Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE