unregmp2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7967f3b34eb66c93d899044a7f83705443b8a0311a0900f68b104edd9e3be348.exe
Resource
win10v2004-20240226-en
General
-
Target
7967f3b34eb66c93d899044a7f83705443b8a0311a0900f68b104edd9e3be348
-
Size
227KB
-
MD5
8fae2093518152564cfdf571b730c842
-
SHA1
6b7f451411e1a33519fae79b3730a0846295669b
-
SHA256
7967f3b34eb66c93d899044a7f83705443b8a0311a0900f68b104edd9e3be348
-
SHA512
1e6f407834947a0e31d541498d6ae69746e3e43938f2b0992b7f7e167d30b223cc6bda60c6835305c393c70740ca8a3c8d4cf8b8d8c6ff5ace4354152f06a9f3
-
SSDEEP
3072:qNH3FJNsfAg0IeHCjyXf+6FlY1v+kGQnH0kR2mNvBj9kDUmQSe:QzdPm1v+k/0kR5ZWDJQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7967f3b34eb66c93d899044a7f83705443b8a0311a0900f68b104edd9e3be348
Files
-
7967f3b34eb66c93d899044a7f83705443b8a0311a0900f68b104edd9e3be348.exe windows:10 windows x86 arch:x86
08cf6be2bde79032587ad5ba07627d94
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegEnumValueW
OpenServiceW
RegDeleteValueW
ChangeServiceConfigW
QueryServiceConfigW
RegOpenKeyExW
RegSetValueExW
RegEnumKeyExW
ControlService
RegCreateKeyExW
RegDeleteKeyW
OpenSCManagerW
CloseServiceHandle
QueryServiceStatus
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyW
kernel32
CloseHandle
RaiseException
HeapSetInformation
LoadResource
FindResourceW
GetSystemWindowsDirectoryW
GetTickCount
DeleteFileW
FindFirstFileExW
FindNextFileW
GetShortPathNameW
RemoveDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
lstrcmpW
ExpandEnvironmentStringsW
GetUserDefaultLCID
RegisterApplicationRestart
CreateEventW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetFileAttributesW
GetFileSize
GetLocalTime
GetWindowsDirectoryA
CreateFileA
GetTempPath2A
SetFilePointer
GetProfileStringW
GetPrivateProfileStringW
WritePrivateProfileStringW
WriteProfileStringW
GetFileTime
FreeLibrary
GetProcAddress
GetWindowsDirectoryW
LoadLibraryW
FileTimeToSystemTime
GetTimeZoneInformation
GetSystemDefaultLangID
GetVersionExW
GetModuleFileNameW
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCIDToLocaleName
GetSystemDirectoryW
GetFileAttributesW
CreateFileW
FindClose
CreateHardLinkW
WriteFile
SetLastError
FindFirstFileW
SizeofResource
CreateDirectoryW
GetLastError
user32
LoadStringW
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_c_exit
_initterm_e
_initterm
api-ms-win-crt-private-l1-1-0
_o__configthreadlocale
_o__configure_narrow_argv
_o__controlfp_s
_o__crt_atexit
_o__exit
_o__get_narrow_winmain_command_line
_o__initialize_narrow_environment
_o__initialize_onexit_table
_o__itow
_o__register_onexit_function
_o__seh_filter_exe
_o__set_app_type
_o__set_fmode
_o__set_new_mode
_o__wcsicmp
_o__wcslwr
_o__wcsnicmp
_o__wtoi
_o__wtol
_o_exit
_o_free
_o_iswalnum
_o_iswalpha
_o_malloc
_o_mbstowcs
_o_terminate
__current_exception
__current_exception_context
_o__callnewh
_except_handler4_common
_o___stdio_common_vswscanf
_o___stdio_common_vswprintf
_o___stdio_common_vsprintf
_o___p__commode
wcsrchr
wcsstr
wcschr
_o__cexit
memcpy
api-ms-win-crt-string-l1-1-0
memset
ole32
StringFromGUID2
CoInitialize
CoCreateGuid
CoUninitialize
CoCreateInstance
PropVariantClear
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SysFreeString
VariantClear
SysAllocString
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
shell32
SHChangeNotify
SHGetMalloc
SHGetSpecialFolderPathW
SHCreateItemFromParsingName
SHSetLocalizedName
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetFolderPathW
ShellExecuteW
shlwapi
PathAddBackslashW
PathUnExpandEnvStringsW
PathRemoveBlanksW
PathRemoveFileSpecW
PathAppendW
PathIsDirectoryW
PathAddBackslashA
Sections
.text Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gydqzxo Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE