mrtstub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
windows-kb890830-x64-v5.100_39ac11b44ee409bd2e92ab441f958815f9241ae1.exe
Resource
win10v2004-20240226-en
General
-
Target
windows-kb890830-x64-v5.100_39ac11b44ee409bd2e92ab441f958815f9241ae1.exe
-
Size
1024KB
-
MD5
eb22c83915b8b37ca6ffb2d6f1b63823
-
SHA1
c7957f70b88bfb3ca71da63d17e83c54d204fc5f
-
SHA256
9ea505df7f2001c4c338855592b62bc19d5fa52fbc26b1585c619c18038740b5
-
SHA512
b74ad4fffac4016dac35dbab7dbf2f434e2e8690cc26c8de1e6453f358c6fd37a3d7c6f6090c6793af9e9f744b3ba7961251ab7762ddd2f3c6ef53c0c618e7fd
-
SSDEEP
12288:xUt7sFpYjERNtuFCks576uCu7TRQq3h5syjbfZT8AHzd3Nd5AGTMwGjq+5WPW9sQ:WsFpCWNUCks5+uXxV8yjdRQjqkUWn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource windows-kb890830-x64-v5.100_39ac11b44ee409bd2e92ab441f958815f9241ae1.exe
Files
-
windows-kb890830-x64-v5.100_39ac11b44ee409bd2e92ab441f958815f9241ae1.exe.exe windows:10 windows x64 arch:x64
e38e4120a4a8dcd64a07e5bd33cb2819
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
TraceMessage
RegCreateKeyExW
RegCloseKey
EventWriteTransfer
UnregisterTraceGuids
RegisterTraceGuidsW
GetTraceEnableLevel
GetTraceEnableFlags
GetTraceLoggerHandle
GetLengthSid
AllocateAndInitializeSid
CopySid
FreeSid
CheckTokenMembership
EventUnregister
EventRegister
RegQueryValueExW
kernel32
GetModuleFileNameW
GetExitCodeProcess
CreateProcessW
FreeLibrary
GetProcAddress
QueryFullProcessImageNameW
FindResourceW
LoadResource
CloseHandle
Process32FirstW
LockResource
Process32NextW
GetLastError
Sleep
CreateToolhelp32Snapshot
SetLastError
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
GetCurrentThreadId
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WriteFile
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapAlloc
SetFileAttributesW
GetFileType
GetStartupInfoW
GetTempPathW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
LoadLibraryExW
LCMapStringW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
MultiByteToWideChar
ExitProcess
GetModuleHandleW
GetModuleHandleExW
GetProcessHeap
SetStdHandle
FlushFileBuffers
WideCharToMultiByte
ReadFile
ReadConsoleW
CreateFileW
WriteConsoleW
SetEndOfFile
HeapSize
HeapReAlloc
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
EncodePointer
InitializeCriticalSectionEx
GlobalMemoryStatusEx
FindNextFileW
FindClose
GetFileAttributesW
OpenProcess
CreateEventW
GetSystemDirectoryW
HeapSetInformation
VirtualLock
WaitForSingleObject
TerminateProcess
DeviceIoControl
GetVolumeInformationW
SizeofResource
GetNativeSystemInfo
GetStdHandle
FindFirstFileExW
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
DecodePointer
rpcrt4
UuidCreate
ntdll
RtlGetVersion
RtlUnwindEx
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlNtStatusToDosError
RtlPcToFileHeader
NtSetInformationFile
wintrust
WTHelperProvDataFromStateData
WinVerifyTrust
WTHelperGetProvSignerFromChain
crypt32
CertVerifyCertificateChainPolicy
Sections
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 38.2MB - Virtual size: 38.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ