winrshost.pdb
Behavioral task
behavioral1
Sample
a239f783a1470c647f99b97846a03309.exe
Resource
win7-20240221-en
General
-
Target
a239f783a1470c647f99b97846a03309
-
Size
164KB
-
MD5
a239f783a1470c647f99b97846a03309
-
SHA1
059d2b29a55dc863d9dce6d2bc9978717654df65
-
SHA256
889f203dc65b3b3396e25ba68aa237eab9a08d24734a18bfae23243f9b46a2f3
-
SHA512
aacf2f1bf4c8532abddd05de5a81f87128e0a1d7ebf9936eef429919579017e0475443b8b38dba5e238835561c62691e4d0136d5e318e73e446429dc884164d1
-
SSDEEP
3072:KkYz7b+FzkucyI8OnHVha2cYEg1++4XMoRL4EDQx45NpLKRPmCC86O258jQ8TnBO:wmuyVOVhaY4XQxwpKD6t58U8TnTj4
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a239f783a1470c647f99b97846a03309
Files
-
a239f783a1470c647f99b97846a03309.exe windows:6 windows x86 arch:x86
79915c568aab003381a023b07517b56f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
TraceEvent
kernel32
GetProcessHeap
InterlockedIncrement
GetLastError
HeapCreate
HeapDestroy
HeapAlloc
HeapFree
LocalFree
LocalAlloc
FreeLibrary
GetProcAddress
LoadLibraryW
GetVersionExW
GetConsoleWindow
SetConsoleCtrlHandler
DeleteCriticalSection
AllocConsole
InitializeCriticalSection
HeapSetInformation
InterlockedDecrement
CloseHandle
SetThreadPreferredUILanguages
SetConsoleCP
SetConsoleOutputCP
CreateProcessW
GenerateConsoleCtrlEvent
WriteConsoleInputW
SetConsoleMode
GetConsoleMode
GetStdHandle
OpenProcess
GetCurrentProcessId
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
TranslateMessage
GetMessageW
PostMessageW
DefWindowProcW
DeleteMenu
GetSystemMenu
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassW
LoadIconW
UnregisterClassW
DestroyWindow
DispatchMessageW
LoadCursorW
msvcrt
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_unlock
__dllonexit
_lock
_initterm
?terminate@@YAXXZ
_except_handler4_common
_controlfp
memcpy
memset
__CxxFrameHandler3
_onexit
_wcsicmp
mbtowc
__getmainargs
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
ole32
CoRegisterClassObject
CoInitializeEx
CoCreateInstance
CoUninitialize
CoRevokeClassObject
CoInitializeSecurity
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE