escUnattend.pdb
Static task
static1
Behavioral task
behavioral1
Sample
escUnattend.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
escUnattend.exe
Resource
win10v2004-20240426-en
General
-
Target
escUnattend.exe
-
Size
85KB
-
MD5
3ecc5f5273c6f294361b7c368d0f2c7b
-
SHA1
466da2aa283ca274bf307b207bcdb3eed73548ab
-
SHA256
10a002cd3bca0ab72b84df4a6ec839925ba71633a0a21c702443f190066205b1
-
SHA512
1e2403206c7eeba54e4a490e5a7517a543b571a8bac1370341b87fdbda6038f091b90f0f3b5a63514a87483a9ad0d0fb8e4d53521d9af3f90f58702037bb80fc
-
SSDEEP
1536:INQ/ka4NeHYE0A2o2qhpN/CL8nCE17laE5PfT:IDgdhpR55z53T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource escUnattend.exe
Files
-
escUnattend.exe.exe windows:6 windows x64 arch:x64
04fde886bac8023701c9164686187426
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
EqualSid
GetTokenInformation
OpenThreadToken
OpenProcessToken
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
GetLengthSid
kernel32
OutputDebugStringA
DeviceIoControl
FlushFileBuffers
MultiByteToWideChar
WideCharToMultiByte
GetFileSizeEx
DeleteFileA
DebugBreak
DeleteFileW
GetVersion
HeapDestroy
HeapSize
GetLastError
GetModuleHandleW
IsDebuggerPresent
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetTempFileNameW
HeapReAlloc
GetFileSize
TlsGetValue
MapViewOfFile
UnmapViewOfFile
VirtualQuery
HeapAlloc
HeapFree
GetProcessHeap
GetWindowsDirectoryA
InitializeCriticalSection
TlsSetValue
FormatMessageW
LeaveCriticalSection
GetFileAttributesW
GetTempPathW
RaiseException
SetLastError
EnterCriticalSection
GetLocalTime
CreateFileMappingW
DeleteCriticalSection
TlsAlloc
GetWindowsDirectoryW
LocalFree
TlsFree
CloseHandle
CreateFileA
CreateMutexW
SetFilePointer
FreeLibrary
WaitForSingleObject
GetCurrentThread
ExpandEnvironmentStringsA
WriteFile
GetModuleFileNameW
CreateFileW
GetProcAddress
CreateFileMappingA
GetSystemInfo
GetModuleFileNameA
LoadLibraryExA
CreateMutexA
ReleaseMutex
msvcrt
_commode
_fmode
_acmdln
__C_specific_handler
wcsrchr
_vsnwprintf
_vsnprintf
??3@YAXPEAX@Z
??2@YAPEAX_K@Z
_wcsicmp
_wcsnicmp
iswctype
?terminate@@YAXXZ
feof
_wtoi
_wfopen
fgetws
swscanf_s
wcstok_s
fclose
towlower
free
_lock
_unlock
__dllonexit
_onexit
__CxxFrameHandler3
_initterm
__setusermatherr
_ismbblead
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
memset
memcpy
ntdll
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
iesetup
IEHardenLMSettings
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
user32
UnregisterClassA
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ