ThumbnailExtractionHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ThumbnailExtractionHost.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ThumbnailExtractionHost.exe
Resource
win10v2004-20231222-en
General
-
Target
ThumbnailExtractionHost.exe
-
Size
28KB
-
MD5
44de276c8d0f67fcf955819686e1020d
-
SHA1
f6a64e4e4593eaf01b6e90ed0979d34f2cfb9c84
-
SHA256
345c6c9505a9557892af0a366ede02a18052835b9888e89398e03e1e5385701e
-
SHA512
41ac7fe93316bcd5fd5a7ed85f97c9617dd8a415a89fc90b855a0ba76f433934490080b80dbaf7ec36735fd6be493d593f4fadab1c36975ca287187aa066e264
-
SSDEEP
384:ob65yB9OdxNlGOPawO2BXHunBvRC8klnr9ydeWvcWB3LMn:ob6wB9ODGtz2NuT7kN9ydv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ThumbnailExtractionHost.exe
Files
-
ThumbnailExtractionHost.exe.exe windows:10 windows x86 arch:x86
c17d0deafd088b1e112bd591c54884a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegOpenKeyExW
EventWriteTransfer
RegQueryInfoKeyW
RegCloseKey
RegGetValueW
kernel32
GetCommandLineW
GetCurrentProcess
GetModuleFileNameW
InitializeCriticalSection
WaitForSingleObject
GetCurrentThreadId
CreateEventW
Sleep
GetLastError
SetEvent
CloseHandle
RaiseException
CreateThread
GetProcAddress
DeleteCriticalSection
GetModuleHandleW
LoadLibraryExW
CloseThreadpoolTimer
GetCurrentThread
SetThreadpoolTimer
CreateThreadpoolTimer
LoadLibraryExA
DelayLoadFailureHook
FreeLibrary
WaitForThreadpoolTimerCallbacks
DuplicateHandle
user32
UnregisterClassA
PostThreadMessageW
TranslateMessage
DispatchMessageW
GetMessageW
CharUpperW
CharNextW
msvcrt
_controlfp
_onexit
__dllonexit
_unlock
_lock
__CxxFrameHandler3
_except_handler4_common
_wcmdln
_initterm
__setusermatherr
__p__fmode
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
_callnewh
malloc
wcsncpy_s
free
_purecall
wcscat_s
wcscpy_s
?terminate@@YAXXZ
memset
oleaut32
RegisterTypeLi
UnRegisterTypeLi
SysAllocString
SysStringLen
SysFreeString
LoadTypeLi
api-ms-win-core-shlwapi-legacy-l1-1-0
PathFindFileNameW
api-ms-win-core-shlwapi-obsolete-l1-1-0
QISearch
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcessId
GetStartupInfoW
TerminateProcess
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-shcore-thread-l1-1-0
SHCreateThread
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ