C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x64\aswAvBootTimeScanShMin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240412-en
General
-
Target
file.bin
-
Size
1.6MB
-
MD5
3fd97c8116999264c370a1b7fab80ba6
-
SHA1
24e252b05b0d1aeec39329784bbfc41a8038ad02
-
SHA256
00e18b6dd077d1653a31266e11465e1a9c66362f35eff47c4403850de9370824
-
SHA512
ba5df677249f3b438c336c1d272497d0be2f0c3fe921c1061b03a976510fe8034990d17c73230a23559c7e11c5f045706178bf80f8d54f594e6540226ae364f4
-
SSDEEP
24576:ul0GQmAp9MMWuL+r0mBYnKOKCaMi5gzwUh0lhSMXlFTcXdAL7WPGCzOrS3ljH5o:d6U+AmWKO5VwZ0SwOr+F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource file.bin
Files
-
file.bin.exe windows:6 windows x64 arch:x64
c1afd4a5c38d1c84527cab10abe9e7dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
comctl32
InitCommonControlsEx
shell32
SHGetFolderPathW
ntdll
RtlUnwind
RtlVirtualUnwind
NtSetInformationThread
VerSetConditionMask
RtlPcToFileHeader
RtlLookupFunctionEntry
NtOpenKey
NtQueryKey
RtlCaptureContext
NtDeleteKey
RtlUnwindEx
RtlNtStatusToDosError
NtClose
kernel32
GetFileInformationByHandle
FileTimeToSystemTime
GetTickCount
GetFileAttributesW
CreateDirectoryW
LoadLibraryExW
FreeLibrary
GetFileAttributesExW
GetLocaleInfoW
GetCurrentProcessId
TerminateProcess
VerifyVersionInfoW
GetExitCodeProcess
CreateProcessW
ResumeThread
WaitForMultipleObjects
GetCurrentThread
GetThreadPriority
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
LocalFree
RaiseException
GetThreadTimes
TerminateThread
SetThreadPriority
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryPerformanceCounter
QueryThreadCycleTime
CompareStringW
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
ExpandEnvironmentStringsW
GetWindowsDirectoryW
GetSystemDirectoryW
SetFilePointer
GlobalMemoryStatusEx
GetExitCodeThread
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetEndOfFile
MoveFileExW
FindClose
GetFullPathNameW
FindFirstFileExW
FindNextFileW
QueryDosDeviceW
GetLogicalDrives
GetVolumePathNameW
GetVolumeNameForVolumeMountPointW
GetEnvironmentVariableW
FlushFileBuffers
OutputDebugStringA
SetFileInformationByHandle
GetDiskFreeSpaceExW
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
GetSystemTimes
GetTickCount64
GetStdHandle
FreeLibraryAndExitThread
ExitThread
CreateThread
InitOnceComplete
InterlockedPushEntrySList
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
GetCPInfo
LCMapStringEx
EncodePointer
WakeConditionVariable
GetLocaleInfoEx
WaitForSingleObjectEx
WriteFile
WaitForSingleObject
ReadFile
GetFileSizeEx
SetFilePointerEx
CompareFileTime
LockFileEx
UnlockFileEx
CreateFileW
GetModuleFileNameW
InitializeCriticalSection
Sleep
HeapReAlloc
HeapSize
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
DeleteFileW
WideCharToMultiByte
DeleteVolumeMountPointW
SetVolumeMountPointW
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
GetProcAddress
DecodePointer
HeapAlloc
GetLastError
GetCurrentThreadId
InitializeCriticalSectionEx
HeapFree
GetModuleFileNameA
GetModuleHandleExW
ResetEvent
CreateEventW
SetEvent
CloseHandle
SetLastError
ExitProcess
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
RegisterWaitForSingleObject
InitOnceBeginInitialize
TryAcquireSRWLockExclusive
FormatMessageA
GetStringTypeW
IsProcessorFeaturePresent
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
user32
MsgWaitForMultipleObjectsEx
MessageBoxA
PostQuitMessage
TranslateMessage
DispatchMessageW
GetClassInfoExW
RegisterWindowMessageW
DefWindowProcW
DestroyWindow
SendMessageW
GetClientRect
ShowWindow
CreateWindowExW
GetSystemMetrics
RegisterClassExW
LoadCursorW
PeekMessageW
gdi32
GetStockObject
advapi32
RegDeleteTreeW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegQueryInfoKeyW
RegCloseKey
RegOpenKeyExW
CloseServiceHandle
CreateServiceW
ChangeServiceConfigW
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
RevertToSelf
EqualSid
OpenProcessToken
GetTokenInformation
OpenThreadToken
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
rpcrt4
RpcEpUnregister
UuidFromStringW
shlwapi
PathMatchSpecW
powrprof
CallNtPowerInformation
Exports
Exports
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
Sections
.text Size: 762KB - Virtual size: 762KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 346KB - Virtual size: 346KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 412KB - Virtual size: 411KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ