C:\__w\1\b\release\x64\WinGetServer\WindowsPackageManagerServer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
WindowsPackageManagerServer.exe
Resource
win11-20240426-en
General
-
Target
WindowsPackageManagerServer.exe
-
Size
46KB
-
MD5
ff969c9a3d4c5a138d21356075eca9c2
-
SHA1
ebf73f56ac0ec02ac2a360849818d6054285bfa6
-
SHA256
4367517703a736e3782a6acca7b880cc58b603b95a78be150b0e3b87d33a23fb
-
SHA512
d8c8de15df79bc58c5f5324dccc7807b1842252975e9d37cead8bbdce0ff2f2b9ba419e0181566d250af17a14793dec1d99378d3eb90d517c48e3bbb83046f71
-
SSDEEP
768:eMsDMVydJPhkQBr0VVTednJ3W4w3XQd0Gx1BWn9nK/z006xoONZ:e1PPu5ypJe3gd0Gx1BinKw07uZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource WindowsPackageManagerServer.exe
Files
-
WindowsPackageManagerServer.exe.exe windows:6 windows x64 arch:x64
db63e52f4fdce9992dbc7f24f31df61a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
rpcrt4
NdrServerCall2
RpcServerRegisterIf3
RpcServerUseProtseqEpA
NdrServerCallAll
advapi32
ConvertSidToStringSidA
IsValidSid
OpenProcessToken
GetTokenInformation
ConvertStringSecurityDescriptorToSecurityDescriptorA
shell32
CommandLineToArgvW
ole32
CreateStreamOnHGlobal
CoMarshalInterface
CoCreateInstance
CoInitializeEx
kernel32
RtlLookupFunctionEntry
RtlCaptureContext
OpenEventW
FormatMessageW
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
GetModuleFileNameA
CreateSemaphoreExW
HeapFree
SetLastError
CreateEventExW
ReleaseSemaphore
GetModuleHandleExW
CreateMutexW
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
GetCurrentProcess
GetLastError
OutputDebugStringW
SetEvent
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
HeapAlloc
GetProcAddress
CreateMutexExW
LocalFree
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
WideCharToMultiByte
DebugBreak
IsDebuggerPresent
IsProcessorFeaturePresent
windowspackagemanager
WindowsPackageManagerServerCreateInstance
WindowsPackageManagerServerWilResultLoggingCallback
WindowsPackageManagerServerModuleCreate
WindowsPackageManagerServerInitialize
WindowsPackageManagerServerModuleUnregister
WindowsPackageManagerServerModuleRegister
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcpy
__std_exception_destroy
__std_exception_copy
__std_terminate
__C_specific_handler
_CxxThrowException
__current_exception
__current_exception_context
memset
memmove
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_seh_filter_exe
_initialize_wide_environment
_get_wide_winmain_command_line
_cexit
_initterm_e
_exit
_crt_atexit
_c_exit
_register_thread_local_exe_atexit_callback
_register_onexit_function
_invalid_parameter_noinfo_noreturn
terminate
_initialize_onexit_table
_errno
_initterm
_configure_wide_argv
_invalid_parameter_noinfo
exit
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vswprintf
__p__commode
api-ms-win-crt-heap-l1-1-0
_callnewh
free
_set_new_mode
malloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ