ehSched.pdb
Static task
static1
Behavioral task
behavioral1
Sample
10c80fa518123af31f82bc923c68b8d8b5c1c18e8c956589fbdb0eb898fefa0c.exe
Resource
win7-20240220-en
General
-
Target
10c80fa518123af31f82bc923c68b8d8b5c1c18e8c956589fbdb0eb898fefa0c
-
Size
691KB
-
MD5
1790c15595f9c79acfc4ff34cebbddb9
-
SHA1
cd262a22e41f8b1cc3cb3dc23fed135fbab881b4
-
SHA256
10c80fa518123af31f82bc923c68b8d8b5c1c18e8c956589fbdb0eb898fefa0c
-
SHA512
ba3574a0388fa70fc0cd8158b4d6f35b64b904343a639df89b8835b77cbdd24a996009354cd3a636ee677993536332364af306b0c58156212398ac38131f0a8d
-
SSDEEP
12288:jwXAwh+FCrNDFKYmKIiirRGW2phzrvXuayM1J3AAlrAf0d83QC0OXxcpGHMki:UQwh+8NDFKYmKOF0zr31JwAlcR3QC0O3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10c80fa518123af31f82bc923c68b8d8b5c1c18e8c956589fbdb0eb898fefa0c
Files
-
10c80fa518123af31f82bc923c68b8d8b5c1c18e8c956589fbdb0eb898fefa0c.exe windows:6 windows x64 arch:x64
56bc9adcf5c93d8b8dc9fbe590f176c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegDeleteKeyW
RegQueryValueExW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CreateServiceW
ChangeServiceConfig2W
ControlService
DeleteService
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
GetAce
GetAclInformation
InitializeAcl
GetLengthSid
IsValidSid
LookupAccountNameW
OpenThreadToken
GetTokenInformation
SetSecurityDescriptorGroup
CopySid
SetNamedSecurityInfoW
LookupAccountSidW
SetSecurityDescriptorOwner
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorDacl
CreateWellKnownSid
OpenProcessToken
kernel32
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
MultiByteToWideChar
CreateWaitableTimerW
CancelWaitableTimer
SetWaitableTimer
SetEvent
CreateEventW
CreateThread
WaitForSingleObject
ExitThread
ResetEvent
GetCurrentThreadId
CreateEventExW
OpenThread
WaitForMultipleObjects
HeapSetInformation
GetCommandLineW
GetCurrentThread
QueryPerformanceCounter
GetTickCount64
QueryPerformanceFrequency
QueueUserWorkItem
GetSystemTimeAsFileTime
OutputDebugStringA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetTickCount
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
GetVersionExA
RaiseException
lstrcmpiW
GetModuleHandleW
LoadLibraryW
GetProcAddress
GetLastError
lstrlenW
FreeLibrary
GetProcessHeap
HeapFree
HeapAlloc
InitializeCriticalSection
EncodeSystemPointer
LocalFree
OutputDebugStringW
GetLocalTime
user32
UnregisterClassA
PostThreadMessageW
UnregisterDeviceNotification
RegisterDeviceNotificationW
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjectsEx
CharNextW
msvcrt
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
realloc
_errno
_amsg_exit
_initterm
fflush
exit
_cexit
_exit
_XcptFilter
__wgetmainargs
__CxxFrameHandler3
_CxxThrowException
__C_specific_handler
memset
_vsnwprintf
?what@exception@@UEBAPEBDXZ
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
memmove_s
calloc
_resetstkoflw
_wcsnicmp
wcscat_s
wcscpy_s
memcpy_s
free
malloc
wcsncpy_s
fputws
??1type_info@@UEAA@XZ
_onexit
_lock
__dllonexit
_wcmdln
_unlock
_purecall
memcpy
ole32
CoInitializeSecurity
CoRevertToSelf
CoSetProxyBlanket
CoImpersonateClient
CoInitialize
CoReleaseServerProcess
CoRegisterClassObject
CoUninitialize
CoRevokeClassObject
CoInitializeEx
CoAddRefServerProcess
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
SysFreeString
slc
SLGetWindowsInformationDWORD
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE