ATBroker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
AtBroker.exe
Resource
win10v2004-20240412-en
General
-
Target
AtBroker.exe
-
Size
64KB
-
MD5
7d152e4285dde2d1f7f3ee12d24fd2d3
-
SHA1
8724af457c3b4af64782c98df0c6301afe180625
-
SHA256
7b0f4d776a38238147b1f79daeaf21047b0dcabe212bef8bfe92f5ffe9a88de2
-
SHA512
cf305a0a481d3d3d26ec85f98854a32f19bbc776e4435f240c69eadc01b54f8524e772bf5110c3dad42e602a9b167f6e6fb74a4d0f5c3d9d1716efd27d434534
-
SSDEEP
768:z/l35mNtIZ1gSOQQ1Pu/lLVitQYTpQpQ5KEYe/qh0xdITx6xr0HvHxlKL0mY9T:jlh2Pu/lLVspwxEYe/qN9PxKY9T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource AtBroker.exe
Files
-
AtBroker.exe.exe windows:10 windows x86 arch:x86
2efc160c23a254ce8d6d8fa126685062
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
OpenServiceW
QueryServiceConfigW
EventUnregister
RegOpenKeyExW
CheckTokenMembership
UnregisterTraceGuids
RegisterTraceGuidsW
FreeSid
GetTraceEnableLevel
RegSetValueExW
GetTraceEnableFlags
GetTraceLoggerHandle
EventSetInformation
TraceMessage
AllocateAndInitializeSid
OpenSCManagerW
EventRegister
CloseServiceHandle
EventWriteTransfer
RegCloseKey
GetTokenInformation
ConvertSidToStringSidW
GetUserNameW
OpenProcessToken
kernel32
ExpandEnvironmentStringsW
SetProcessShutdownParameters
LocalAlloc
GetCurrentThreadId
SetLastError
MultiByteToWideChar
Sleep
GetLastError
LockResource
CloseHandle
RaiseException
FindResourceExW
LoadResource
GetProcAddress
LocalFree
GetModuleHandleW
DebugBreak
lstrcmpiW
OpenMutexW
UpdateProcThreadAttribute
InitializeProcThreadAttributeList
OpenProcess
ReleaseMutex
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
SizeofResource
GetModuleFileNameA
GetModuleHandleExW
GetVersionExW
IsProcessInJob
OpenJobObjectW
IsDebuggerPresent
CreateMutexExW
OpenSemaphoreW
WaitForSingleObjectEx
InitOnceComplete
OutputDebugStringW
FormatMessageW
WaitForSingleObject
ReleaseSemaphore
CreateSemaphoreExW
InitOnceBeginInitialize
RegEnumValueW
RegDeleteTreeW
K32GetModuleBaseNameW
K32EnumProcessModules
ProcessIdToSessionId
K32EnumProcesses
RegLoadMUIStringW
DeleteFileW
RegGetValueW
RegCreateKeyExW
RegEnumKeyExW
GetTickCount
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetFileAttributesW
DeleteProcThreadAttributeList
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
HeapDestroy
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateProcessW
user32
SendInput
GetKeyState
UnregisterClassA
GetShellWindow
GetWindowThreadProcessId
SetDesktopColorTransform
SendNotifyMessageW
GetThreadDesktop
GetUserObjectInformationW
SystemParametersInfoW
msvcrt
memcpy_s
_wcsicmp
wcscpy_s
??1type_info@@UAE@XZ
_callnewh
_controlfp
?terminate@@YAXXZ
_except_handler4_common
_onexit
__dllonexit
_unlock
_lock
_initterm
__setusermatherr
__p__fmode
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
??_V@YAXPAX@Z
memmove_s
malloc
free
__CxxFrameHandler3
_wtoi
wcsrchr
_vsnwprintf
wcsspn
wcscspn
_wcslwr_s
_ltow_s
memset
ntdll
WinSqmIsOptedIn
WinSqmAddToStream
NtUpdateWnfStateData
NtQueryWnfStateData
shell32
ShellExecuteW
shlwapi
ord460
PathFileExistsW
uxtheme
ord65
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ