t:\misc_name\x86\ship\0\namecontrolserver.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2ec4d1a943a19268dfa8eff66c52d8782f578e08c29eb8d6c594b82088a3d6b7.exe
Resource
win7-20240221-en
General
-
Target
2ec4d1a943a19268dfa8eff66c52d8782f578e08c29eb8d6c594b82088a3d6b7
-
Size
158KB
-
MD5
97e977751b9ed6e27c5e0ebf5efa58f7
-
SHA1
58b6a67379f710503202734d9a91bc22377d0055
-
SHA256
2ec4d1a943a19268dfa8eff66c52d8782f578e08c29eb8d6c594b82088a3d6b7
-
SHA512
30ca44b08ad390f494c0c41dd3747fb306862bbe7eae8fea110dfbc58ff706827aed7a8945b313e098bd2d0866c48389c1d66da4aee0479c7b46788362544d4e
-
SSDEEP
3072:X0u+oLk/t+gq6Madinh1UsoeOvW877NDS5lSnYt0LE+5YzSfu8Qmy87LGf7zwyhY:Xoek/tpHMa0nzmeOvW8fNDS5lSYi5eSB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ec4d1a943a19268dfa8eff66c52d8782f578e08c29eb8d6c594b82088a3d6b7
Files
-
2ec4d1a943a19268dfa8eff66c52d8782f578e08c29eb8d6c594b82088a3d6b7.exe windows:5 windows x86 arch:x86
93b39ac038597436263c4e7976a18afa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
GetModuleFileNameA
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
CreateThread
CreateEventA
IsDBCSLeadByte
SetEvent
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetCommandLineA
GetModuleHandleW
WaitForSingleObject
CloseHandle
lstrcmpiA
lstrlenA
MultiByteToWideChar
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
GetModuleFileNameW
HeapAlloc
HeapFree
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetModuleHandleA
GetProcAddress
GetLastError
DeleteCriticalSection
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
QueryPerformanceCounter
VirtualProtect
InterlockedExchange
LocalAlloc
LoadLibraryA
GetSystemDirectoryW
LoadLibraryExW
LoadLibraryW
user32
PeekMessageA
CharNextA
CharUpperA
CharNextW
WaitMessage
KillTimer
SetTimer
DispatchMessageA
RegisterClassExW
CreateWindowExW
SetActiveWindow
DestroyWindow
PostQuitMessage
DefWindowProcW
PostThreadMessageA
PostMessageA
GetMessageA
TranslateMessage
advapi32
RegQueryValueExW
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExW
DeregisterEventSource
ReportEventW
RegisterEventSourceW
ole32
CoInitialize
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoUninitialize
StringFromGUID2
CoInitializeEx
CoTaskMemFree
oleaut32
VariantInit
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
VariantClear
SysFreeString
msvcr90
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_controlfp_s
_invoke_watson
?terminate@@YAXXZ
_crt_debugger_hook
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
??3@YAXPAX@Z
??_V@YAXPAX@Z
strstr
malloc
free
memcpy_s
strcpy_s
wcsncpy_s
strncpy_s
strcat_s
_resetstkoflw
memset
_recalloc
calloc
??_U@YAPAXI@Z
??2@YAPAXI@Z
wcschr
_wcsicmp
vswprintf_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_except_handler4_common
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE