AgentService.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c81e7344b5960ee9a2f8ccd9cdcacdbb.exe
Resource
win10v2004-20240226-en
General
-
Target
c81e7344b5960ee9a2f8ccd9cdcacdbb
-
Size
1.5MB
-
MD5
c81e7344b5960ee9a2f8ccd9cdcacdbb
-
SHA1
2b6a55f89c71fc9099fcd5b69dfbf5d7a4cb5a34
-
SHA256
eaa71ac767fe850ab491edf839cbe561bd900101f2503628f913a8c00f91deb9
-
SHA512
85664e3436efdce25e779c1aa7c7adf1e56afac814c85e7546f172146dec185ac6afc673966c9d5a73cfb6c696ba5f97ea2d85ee18b62187d96eb3dabb67f300
-
SSDEEP
24576:+HO2QxywLyc/VkxxnKNDzR+QaMLWRh229pI8LTJXkLh+fRhc5eEH02mJ7izdK3x3:AO2QxzDV0xnaDd+OHKJ4Y3ukuz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c81e7344b5960ee9a2f8ccd9cdcacdbb
Files
-
c81e7344b5960ee9a2f8ccd9cdcacdbb.exe windows:10 windows x64 arch:x64
26726e2f78645ad9c311f13886afe185
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
EventSetInformation
RegisterServiceCtrlHandlerW
SetServiceStatus
EventRegister
EventWriteTransfer
RegGetValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
DuplicateTokenEx
CreateProcessAsUserW
OpenProcessToken
SetTokenInformation
GetTokenInformation
RegQueryValueExW
EventUnregister
GetSidSubAuthority
GetSidSubAuthorityCount
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteKeyExW
RegDeleteValueW
RegEnumKeyExW
RegDeleteTreeW
RegQueryInfoKeyW
RegCreateKeyExW
RegEnumValueW
RegSetKeyValueW
GetNamedSecurityInfoW
CreateWellKnownSid
EqualSid
ConvertSidToStringSidW
StartServiceCtrlDispatcherW
kernel32
GetShortPathNameW
QueryFullProcessImageNameW
lstrcmpiW
GetSystemWindowsDirectoryW
GetCurrentProcessId
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
CloseHandle
Sleep
ProcessIdToSessionId
TlsGetValue
TlsAlloc
TlsSetValue
ResetEvent
OpenEventA
FormatMessageA
AreFileApisANSI
OpenProcess
DeviceIoControl
CreateDirectoryW
FreeLibrary
LocalAlloc
GetCurrentProcess
GetModuleFileNameW
lstrlenA
FindClose
FindNextFileW
FindFirstFileW
GetFileTime
SystemTimeToFileTime
GetFileSize
DeleteFileW
SetEvent
SetFileAttributesW
GetComputerNameExW
GetFileAttributesW
CreateFileW
ExpandEnvironmentStringsW
WriteFile
CreateEventA
ReadFile
GetLocalTime
IsDebuggerPresent
DebugBreak
GetProcessHeap
CreateMutexExW
GetProcAddress
HeapAlloc
OpenSemaphoreW
WaitForSingleObjectEx
ReleaseMutex
GetModuleHandleExW
ReleaseSemaphore
SetLastError
HeapFree
CreateSemaphoreExW
GetModuleFileNameA
TerminateProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
DeleteCriticalSection
CreateIoCompletionPort
CreateThread
GetSystemInfo
GetQueuedCompletionStatus
GetProcessMitigationPolicy
WaitForSingleObject
LocalUnlock
LocalFree
FormatMessageW
LocalLock
OutputDebugStringW
GetLastError
IsWow64Process
GetCurrentDirectoryW
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
InitializeCriticalSectionEx
GetLocaleInfoW
EnterCriticalSection
LeaveCriticalSection
msvcrt
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
isdigit
isalnum
memcmp
___lc_collate_cp_func
memchr
tolower
isspace
_Strftime
_Gettnames
__mb_cur_max
_Wcsftime
_W_Gettnames
_W_Getmonths
_W_Getdays
_Getmonths
_Getdays
memcpy_s
ldexp
realloc
abort
_free_locale
_get_current_locale
__crtLCMapStringA
__crtLCMapStringW
__crtCompareStringA
__crtCompareStringW
??8type_info@@QEBAHAEBV0@@Z
_wcsdup
__uncaught_exception
islower
memset
_ismbblead
___mb_cur_max_func
calloc
___lc_codepage_func
___lc_handle_func
isupper
exit
setlocale
_unlock
_lock
_errno
memmove
memcpy
_CxxThrowException
??0exception@@QEAA@AEBQEBDH@Z
_callnewh
malloc
sprintf_s
localeconv
?name@type_info@@QEBAPEBDXZ
??0exception@@QEAA@XZ
strcspn
free
_vsnwprintf
_vsnprintf_s
fputc
fflush
fclose
fgetc
fwrite
fgetpos
setvbuf
ungetc
fsetpos
_fseeki64
_wcsicmp
_wtoi
strchr
ldiv
time
_wcsnicmp
_stricmp
strerror
fseek
_wfsopen
mbstowcs_s
__CxxFrameHandler3
??_V@YAXPEAX@Z
_purecall
swprintf_s
_exit
_cexit
__setusermatherr
_initterm
__C_specific_handler
_fmode
_commode
?terminate@@YAXXZ
__dllonexit
_onexit
??1type_info@@UEAA@XZ
??3@YAXPEAX@Z
__pctype_func
??0exception@@QEAA@AEBV0@@Z
??0exception@@QEAA@AEBQEBD@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
??0bad_cast@@QEAA@AEBV0@@Z
??0bad_cast@@QEAA@PEBD@Z
??1bad_cast@@UEAA@XZ
wcscmp
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
ole32
CoInitializeEx
CoTaskMemFree
CLSIDFromProgID
OleRun
CoUninitialize
CoCreateInstance
CLSIDFromString
oleaut32
SysStringLen
SysFreeString
SysAllocString
SysAllocStringByteLen
VariantClear
wintrust
WinVerifyTrust
fltlib
FilterReplyMessage
FilterGetMessage
FilterConnectCommunicationPort
shell32
SHGetKnownFolderPath
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
activeds
ord3
Sections
.text Size: 785KB - Virtual size: 784KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 307KB - Virtual size: 306KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 400KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ