RunLegacyCPLElevated.pdb
Static task
static1
Behavioral task
behavioral1
Sample
RunLegacyCPLElevated.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RunLegacyCPLElevated.exe
Resource
win10v2004-20231215-en
General
-
Target
RunLegacyCPLElevated.exe
-
Size
23KB
-
MD5
0b9aeba945ea7dd874c045761ec85e49
-
SHA1
25a8bd6c7fa168ca5550ac5c5a2d8024d1237111
-
SHA256
20390b55744bd5a7d67c8f5b31932ff3997f8f0d1bed7d860332de31a02a7074
-
SHA512
c92bec92295bf1d329b1a1c54094864baebaf1eb4fa74b98d280be5b3220c94f78f1766b5bae6c02d50a68327d6c07ed1d6fc783191a153c3df264806b1dcd9a
-
SSDEEP
384:/6newjADy7Vo5PIp0cGoh9zrSBjK6kawPNuYgs8JaFPclGHdHMyubC2WsYWQVl:/6eW7Vo5PIp0vgYeLasgs6mcUsyubCE0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource RunLegacyCPLElevated.exe
Files
-
RunLegacyCPLElevated.exe.exe windows:10 windows x86 arch:x86
10c87299d11d29a4096b000a7bc87c4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameA
CreateSemaphoreExW
HeapFree
SetLastError
lstrlenW
ReleaseSemaphore
GetModuleHandleExW
SetErrorMode
WaitForSingleObject
LocalAlloc
GetCurrentThreadId
ReleaseMutex
FormatMessageW
GetLastError
OutputDebugStringW
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
HeapSetInformation
HeapAlloc
GetProcAddress
CreateMutexExW
LocalFree
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
DebugBreak
IsDebuggerPresent
CreateActCtxW
ActivateActCtx
DeactivateActCtx
ReleaseActCtx
user32
DestroyWindow
GetClassLongW
GetWindow
DefWindowProcW
SetClassLongW
GetClassNameW
RegisterClassW
SetWindowLongW
LoadCursorW
CreateWindowExW
GetWindowLongW
msvcrt
__setusermatherr
__p__fmode
_unlock
_except_handler4_common
_initterm
_controlfp
?terminate@@YAXXZ
_onexit
_wcmdln
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
memcpy_s
_vsnwprintf
__dllonexit
_lock
memset
shell32
Control_RunDLLW
shlwapi
PathIsRelativeW
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcess
TerminateProcess
GetStartupInfoW
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-processenvironment-l1-1-0
SearchPathW
api-ms-win-core-string-l1-1-0
CompareStringW
api-ms-win-core-file-l1-1-0
GetFileAttributesW
api-ms-win-core-string-l2-1-0
CharNextW
ntdll
RtlSetSearchPathMode
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ