ehSched.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b3cf6fc333b6b0710b50a22354b06b7c34ee41a80048e02fa3f814bc686a0228.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3cf6fc333b6b0710b50a22354b06b7c34ee41a80048e02fa3f814bc686a0228.exe
Resource
win10v2004-20240226-en
General
-
Target
b3cf6fc333b6b0710b50a22354b06b7c34ee41a80048e02fa3f814bc686a0228
-
Size
1.3MB
-
MD5
1c0eb8fe1e468ef1aab66115b6ec8bb1
-
SHA1
2ddf2470f0599678989c6bd261539a85f56c51ad
-
SHA256
b3cf6fc333b6b0710b50a22354b06b7c34ee41a80048e02fa3f814bc686a0228
-
SHA512
29d029f04e490b47793b71b5567d4ab391cfcb0a234427413a03ce6fbb91c27b051be57307aa5478aee574ce222ae405aa2430360a8f749deb3b934f22b353ff
-
SSDEEP
24576:TQwhmG+L6VMRCPU6CENltmVVdpx7fLrQWd:TnhK6ZU6CENlc7dpJLrQWd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3cf6fc333b6b0710b50a22354b06b7c34ee41a80048e02fa3f814bc686a0228
Files
-
b3cf6fc333b6b0710b50a22354b06b7c34ee41a80048e02fa3f814bc686a0228.exe windows:6 windows x64 arch:x64
56bc9adcf5c93d8b8dc9fbe590f176c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegDeleteKeyW
RegQueryValueExW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CreateServiceW
ChangeServiceConfig2W
ControlService
DeleteService
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
GetAce
GetAclInformation
InitializeAcl
GetLengthSid
IsValidSid
LookupAccountNameW
OpenThreadToken
GetTokenInformation
SetSecurityDescriptorGroup
CopySid
SetNamedSecurityInfoW
LookupAccountSidW
SetSecurityDescriptorOwner
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorDacl
CreateWellKnownSid
OpenProcessToken
kernel32
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
MultiByteToWideChar
CreateWaitableTimerW
CancelWaitableTimer
SetWaitableTimer
SetEvent
CreateEventW
CreateThread
WaitForSingleObject
ExitThread
ResetEvent
GetCurrentThreadId
CreateEventExW
OpenThread
WaitForMultipleObjects
HeapSetInformation
GetCommandLineW
GetCurrentThread
QueryPerformanceCounter
GetTickCount64
QueryPerformanceFrequency
QueueUserWorkItem
GetSystemTimeAsFileTime
OutputDebugStringA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetTickCount
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
GetVersionExA
RaiseException
lstrcmpiW
GetModuleHandleW
LoadLibraryW
GetProcAddress
GetLastError
lstrlenW
FreeLibrary
GetProcessHeap
HeapFree
HeapAlloc
InitializeCriticalSection
EncodeSystemPointer
LocalFree
OutputDebugStringW
GetLocalTime
user32
UnregisterClassA
PostThreadMessageW
UnregisterDeviceNotification
RegisterDeviceNotificationW
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjectsEx
CharNextW
msvcrt
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
realloc
_errno
_amsg_exit
_initterm
fflush
exit
_cexit
_exit
_XcptFilter
__wgetmainargs
__CxxFrameHandler3
_CxxThrowException
__C_specific_handler
memset
_vsnwprintf
?what@exception@@UEBAPEBDXZ
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
memmove_s
calloc
_resetstkoflw
_wcsnicmp
wcscat_s
wcscpy_s
memcpy_s
free
malloc
wcsncpy_s
fputws
??1type_info@@UEAA@XZ
_onexit
_lock
__dllonexit
_wcmdln
_unlock
_purecall
memcpy
ole32
CoInitializeSecurity
CoRevertToSelf
CoSetProxyBlanket
CoImpersonateClient
CoInitialize
CoReleaseServerProcess
CoRegisterClassObject
CoUninitialize
CoRevokeClassObject
CoInitializeEx
CoAddRefServerProcess
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
SysFreeString
slc
SLGetWindowsInformationDWORD
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE