D:\CB\ARM_Main\BuildResults\bin\Win32\Release\armsvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cda11e2f381574b5b151d2ecdc82a0bd.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cda11e2f381574b5b151d2ecdc82a0bd.exe
Resource
win10v2004-20231215-en
General
-
Target
cda11e2f381574b5b151d2ecdc82a0bd
-
Size
475KB
-
MD5
cda11e2f381574b5b151d2ecdc82a0bd
-
SHA1
e0646d5822c6573733ab2138052ebe8dd84be674
-
SHA256
15aaadd5f32eeeb4a5e1d0a32f81eb11dc916b3176ff91703355cc5ef60fa82f
-
SHA512
16fa3949e9da94ec896615f75468cedf705d1949743dad461d26c5e986eaf5eae1c84f7828adfd406ffd776b0d597e585a1f2b6d8f70972bb537619f3db33853
-
SSDEEP
12288:PcaPUX47RNMWdqvSk5R088Bo7Tl9fB6n4:PcaPXCSkwE9f44
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cda11e2f381574b5b151d2ecdc82a0bd
Files
-
cda11e2f381574b5b151d2ecdc82a0bd.exe windows:5 windows x86 arch:x86
62a13b05e2841f282c85619451838949
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSize
FormatMessageW
FlushFileBuffers
GetLocalTime
MapViewOfFile
UnmapViewOfFile
Sleep
CreateFileMappingW
OpenFileMappingW
GetVolumeInformationW
FindFirstFileW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
WritePrivateProfileStringW
GetPrivateProfileStringW
GetCurrentThread
GetCurrentProcess
LocalFree
DeleteFileW
CloseHandle
GetCurrentThreadId
DeleteCriticalSection
FindNextFileW
lstrcmpiW
RemoveDirectoryW
LocalAlloc
FindClose
GetProcAddress
GetLastError
RaiseException
GetTempPathW
lstrlenW
MultiByteToWideChar
lstrcmpW
CreateFileW
GetModuleFileNameW
ReadFile
GetFileAttributesW
SizeofResource
CopyFileW
InitializeCriticalSection
WriteFile
GetTickCount
GetModuleHandleW
CreateDirectoryW
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
SetFilePointer
HeapAlloc
HeapDestroy
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
InterlockedIncrement
InterlockedDecrement
lstrcmpA
user32
LoadStringW
CharNextW
PostThreadMessageW
DispatchMessageW
GetMessageW
advapi32
CloseServiceHandle
RegisterEventSourceW
DeleteService
OpenSCManagerW
StartServiceCtrlDispatcherW
OpenServiceW
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
CheckTokenMembership
GetLengthSid
InitializeSid
GetSidLengthRequired
IsValidSid
DuplicateToken
CopySid
OpenThreadToken
GetSidSubAuthority
OpenProcessToken
RegSetValueExW
RegCloseKey
RegEnumKeyExW
ControlService
ReportEventW
RegisterServiceCtrlHandlerW
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetServiceStatus
RegDeleteValueW
RegDeleteKeyW
DeregisterEventSource
CreateServiceW
shell32
SHGetFolderPathW
ShellExecuteExW
SHCreateDirectoryExW
ole32
CoCreateInstance
CoUninitialize
CoTaskMemRealloc
StringFromGUID2
CoInitialize
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemAlloc
CoTaskMemFree
oleaut32
SysStringLen
LoadTypeLi
SysFreeString
RegisterTypeLi
VarUI4FromStr
UnRegisterTypeLi
SysAllocString
crypt32
CryptDecodeObject
CryptQueryObject
CertGetNameStringW
CertFreeCertificateContext
CertFindCertificateInStore
CertCloseStore
CryptMsgGetParam
CryptMsgClose
wintrust
WinVerifyTrust
msvcr90
__p__fmode
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_CxxThrowException
__CxxFrameHandler3
__set_app_type
__p__commode
_adjust_fdiv
??3@YAXPAX@Z
wcsncpy_s
??_U@YAPAXI@Z
memcmp
free
malloc
wcsnlen
vswprintf_s
wcslen
wcsstr
_recalloc
memset
??_V@YAXPAX@Z
rand
_itow_s
srand
rand_s
memcpy_s
_putws
wcscat_s
abs
wcscpy_s
_time64
_wtoi
swprintf_s
?terminate@@YAXXZ
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
userenv
UnloadUserProfile
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 400KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ