nowmyshell.pdb
Static task
static1
Behavioral task
behavioral1
Sample
p0wersh3ll.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
p0wersh3ll.exe
Resource
win10v2004-20240412-en
General
-
Target
p0wersh3ll.exe
-
Size
449KB
-
MD5
09db1929f03ca4d8b4c8bd608d1e45cb
-
SHA1
3579de2c3be18feb8bb833c3022049fbb0783f9c
-
SHA256
dffa401e195622e92b036bed665419445b778a278f6b2b2c95f51c3f5bcbab64
-
SHA512
cff75974ac75a7b341a139f44fe536c3d01bb9f571f6bc1d2ba24bc566e8eee333d918dec3e2430c40e9361beb8700cb712c2f0cd3f41ccad7753711d784310a
-
SSDEEP
6144:4Lp8aRyCXBgoDhzoNKXzJ7BapCK5d3klRzULOnWyjLsPhAQzqO:aRRZgQhIKXzJ4pdd3klnnWosPhnzq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource p0wersh3ll.exe
Files
-
p0wersh3ll.exe.exe windows:6 windows x86 arch:x86
5a87d2858188870b4dad9dd3f3158173
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegGetValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegQueryValueExW
kernel32
GetCurrentProcess
GetModuleHandleW
SetThreadUILanguage
WriteFile
FormatMessageW
GetVersionExW
GetFileAttributesW
WriteConsoleW
CreateFileW
CompareStringW
GetStartupInfoW
GetStdHandle
GetLastError
GetCurrentDirectoryW
SetLastError
FindClose
IsWow64Process
GetFileType
SetConsoleTitleW
CloseHandle
LocalFree
ExpandEnvironmentStringsW
CreateFileMappingW
GetLocaleInfoW
LoadLibraryExW
LoadResource
FreeLibrary
FindResourceExW
GetSystemDefaultUILanguage
UnmapViewOfFile
MapViewOfFile
SearchPathW
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
FindFirstFileW
SetErrorMode
GetUserDefaultUILanguage
msvcrt
memset
memcmp
memcpy
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__CxxFrameHandler3
_except_handler4_common
_CxxThrowException
bsearch
_controlfp
_vsnwprintf
_initterm
__setusermatherr
__p__fmode
_cexit
_exit
exit
__set_app_type
__wgetmainargs
_amsg_exit
__p__commode
_XcptFilter
??2@YAPAXI@Z
wcsncmp
_itow
??3@YAXPAX@Z
??_V@YAXPAX@Z
wcsrchr
malloc
free
wcstoul
??_U@YAPAXI@Z
wcschr
_wcsicmp
_wcsnicmp
atl
ord30
ole32
CoInitializeEx
CoTaskMemFree
PropVariantClear
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
VariantClear
SafeArrayCreate
SysFreeString
SafeArrayPutElement
SysStringLen
shlwapi
SHStrDupW
user32
LoadStringW
shell32
SHGetKnownFolderPath
mscoree
CorBindToRuntimeEx
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 400KB - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ