wscntfy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7ce98d4d1070f2a41f92ee6f5f618b04.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7ce98d4d1070f2a41f92ee6f5f618b04.exe
Resource
win10v2004-20231222-en
General
-
Target
7ce98d4d1070f2a41f92ee6f5f618b04
-
Size
157KB
-
MD5
7ce98d4d1070f2a41f92ee6f5f618b04
-
SHA1
ae03a2650c4158072538c41321481c4ae383f883
-
SHA256
58d42c1f74bbe31930ea1f7213d7d10a1b787805c837c7abf320fc42b93282af
-
SHA512
e8b414934885790b5e94309618b1a6fbc354588f05c12e682076487b298216c5d10447bc4f39643393b7389736bfba6182acb48d243cf0977fb1338f94025570
-
SSDEEP
3072:Kr51knp1POO+VGrMhW/5V2xDEE9o0i4tZsHG+Lseszr7zEIMNA5nz0k:KrGp1X+VGrf/5VaV98HG+Lslzr9tnz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ce98d4d1070f2a41f92ee6f5f618b04
Files
-
7ce98d4d1070f2a41f92ee6f5f618b04.exe windows:5 windows x86 arch:x86
91ec832ac4951cd03c383d283c59899c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
kernel32
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetUserDefaultUILanguage
GetLocaleInfoW
CreateProcessW
GetProcessHeap
HeapFree
HeapAlloc
LoadLibraryExW
GetStartupInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetLastError
CreateMutexW
CloseHandle
FormatMessageW
CreateEventW
GetCurrentProcessId
user32
PeekMessageW
DispatchMessageW
MsgWaitForMultipleObjects
RegisterWindowMessageW
LoadStringW
LoadImageW
PostQuitMessage
PostMessageW
DestroyMenu
TrackPopupMenu
SetMenuDefaultItem
SetMenuItemInfoW
AppendMenuW
CreatePopupMenu
SetForegroundWindow
GetCursorPos
DefWindowProcW
CreateWindowExW
LoadCursorW
LoadIconW
ShowWindow
RegisterClassExW
shell32
SHGetFolderPathW
ShellExecuteW
Shell_NotifyIconW
rpcrt4
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcBindingFree
RpcSsDestroyClientContext
NdrClientCall2
RpcStringFreeW
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE