aspnet_state.pdb
Static task
static1
Behavioral task
behavioral1
Sample
59527965f3be705459aa656588f186f8ca1dd69edb1874a8a440b97579b73b11.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
59527965f3be705459aa656588f186f8ca1dd69edb1874a8a440b97579b73b11.exe
Resource
win10v2004-20240419-en
General
-
Target
59527965f3be705459aa656588f186f8ca1dd69edb1874a8a440b97579b73b11
-
Size
2.2MB
-
MD5
bcb48637c430d5f7c1075660b308336a
-
SHA1
9111e5422670c4d6ae8f82fa240d854b0926256b
-
SHA256
59527965f3be705459aa656588f186f8ca1dd69edb1874a8a440b97579b73b11
-
SHA512
5c520f2ddf2aba45716df23cf13cd71cdf56d9aa726ebc6b05ec996c41b1255ed26118e172369b2ad87446fd1ee07a578ee72318e9107567f899a4dbc3c11dba
-
SSDEEP
24576:tKKTJRNih9JJd3n+Otv2K5iP7iE9JJd3n+Otv2K5iP7i/:YcihOyCPOEOyCPO/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59527965f3be705459aa656588f186f8ca1dd69edb1874a8a440b97579b73b11
Files
-
59527965f3be705459aa656588f186f8ca1dd69edb1874a8a440b97579b73b11.exe windows:5 windows x86 arch:x86
260725db05d85038f0d2595a14b7e42a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetWaitableTimer
CloseHandle
CreateThread
CreateWaitableTimerW
CreateEventW
SetConsoleCtrlHandler
FormatMessageW
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
lstrlenW
WideCharToMultiByte
FileTimeToSystemTime
FileTimeToLocalFileTime
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
Sleep
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSystemInfo
WaitForSingleObject
SetEvent
GetProcessAffinityMask
SwitchToThread
MultiByteToWideChar
GetLastError
HeapReAlloc
InterlockedCompareExchange
InterlockedExchange
HeapFree
HeapAlloc
GetProcAddress
HeapDestroy
HeapCreate
FreeLibrary
GetCurrentProcessId
msvcr80
__set_app_type
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_invoke_watson
_controlfp_s
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_purecall
strncmp
memcpy
_vsnwprintf_s
memset
_itoa_s
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
__winitenv
_initterm
strtol
strstr
strchr
advapi32
RegCloseKey
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
RegQueryValueExW
RegOpenKeyExW
SetServiceStatus
mswsock
GetAcceptExSockaddrs
AcceptEx
ole32
CoUninitialize
CoInitializeEx
ws2_32
recv
select
WSASend
WSARecv
WSAGetOverlappedResult
WSAAddressToStringA
gethostbyname
ntohs
WSACleanup
WSAStartup
closesocket
WSASocketW
WSAGetLastError
setsockopt
htons
htonl
bind
listen
inet_ntoa
mscoree
ClrCreateManagedInstance
webengine
PerfCounterInitialize
InitializeLibrary
XspLogEvent
AttachHandleToThreadPool
LoadLibraryUsingFullPath
PrintResourceString
AspnetLoadResourceDLL
GetXSPHeap
Exports
Exports
_STWNDCloseConnection@4
_STWNDDeleteStateItem@4
_STWNDEndOfRequest@4
_STWNDGetLocalAddress@8
_STWNDGetLocalPort@4
_STWNDGetRemoteAddress@8
_STWNDGetRemotePort@4
_STWNDIsClientConnected@4
_STWNDSendResponse@24
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ