P:\Target\x86\ship\delivery\x-none\ose.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b060ef34b7fb8a8e6a4e0541b5ad98da108dd83f040be60f52a6bb2dfeddb6e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b060ef34b7fb8a8e6a4e0541b5ad98da108dd83f040be60f52a6bb2dfeddb6e.exe
Resource
win10v2004-20240426-en
General
-
Target
1b060ef34b7fb8a8e6a4e0541b5ad98da108dd83f040be60f52a6bb2dfeddb6e
-
Size
1.5MB
-
MD5
efa740c86007c6777aacf901ee985e59
-
SHA1
be2393a0dfbd5a7eb72a190ec5cd340448bab937
-
SHA256
1b060ef34b7fb8a8e6a4e0541b5ad98da108dd83f040be60f52a6bb2dfeddb6e
-
SHA512
82ad82db3a2f35d23aa316544371d6b69022897bde75561a66cb5de2440080749c7fd43aa9e2cbe3dc215e9cf4e3247e8617bc4c2ff7121939eab6bef6ea4fc8
-
SSDEEP
24576:WHQy5Sk2OXVav9MkYcuzKPgssStPUvgodwsNDS5lSo:q92fv9M3hKPgssSt2gousNDS5lSo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1b060ef34b7fb8a8e6a4e0541b5ad98da108dd83f040be60f52a6bb2dfeddb6e
Files
-
1b060ef34b7fb8a8e6a4e0541b5ad98da108dd83f040be60f52a6bb2dfeddb6e.exe windows:6 windows x86 arch:x86
c8aa01ee81dfa614588a44bb990de12a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
SetThreadToken
RegEnumValueW
RegQueryValueExW
RegSetValueExW
RegNotifyChangeKeyValue
SetServiceStatus
StartServiceCtrlDispatcherW
DuplicateToken
GetUserNameA
RegDeleteValueW
RegisterServiceCtrlHandlerW
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
LookupAccountNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
CryptAcquireContextW
CryptReleaseContext
SetFileSecurityW
RegDeleteKeyW
OpenThreadToken
kernel32
GetLastError
SetEvent
GetModuleFileNameW
GetDriveTypeW
GetLogicalDrives
lstrcmpW
lstrlenW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
ExitProcess
GetCommandLineW
SetErrorMode
ResetEvent
CloseHandle
WaitForMultipleObjectsEx
CreateMutexW
CreateEventW
CreateProcessW
GetSystemInfo
GetTickCount
MoveFileExW
CreateFileA
CreateFileW
ReadFile
SetFilePointer
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryExW
DosDateTimeToFileTime
MultiByteToWideChar
WideCharToMultiByte
ReleaseSemaphore
WaitForSingleObject
ReleaseMutex
CreateSemaphoreW
CreateThread
SetFilePointerEx
VirtualAlloc
VirtualFree
GlobalAlloc
GlobalFree
GetSystemTimeAsFileTime
ExpandEnvironmentStringsW
CompareStringW
SetEndOfFile
SetFileTime
WriteFile
GetSystemTime
SystemTimeToFileTime
LocalFree
FindClose
GetTempPathA
CreateDirectoryW
GetFileAttributesW
GetTempPathW
FindFirstFileW
GetFileSizeEx
QueryPerformanceCounter
DeleteFileW
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetStdHandle
lstrlenA
FindNextFileW
RemoveDirectoryW
SetFileAttributesW
GetFileAttributesExW
GetFileTime
CopyFileW
CreateHardLinkW
FormatMessageA
GetComputerNameW
GetCurrentThread
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
LoadLibraryExA
VirtualQuery
VirtualProtect
WriteConsoleW
DecodePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
LCMapStringW
WaitForMultipleObjects
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwind
RaiseException
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleFileNameA
GetModuleHandleExW
GetACP
GetStringTypeW
GetFileType
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
rpcrt4
RpcServerRegisterIfEx
RpcImpersonateClient
RpcRevertToSelf
NdrServerCall2
RpcServerUnregisterIf
RpcServerUseProtseqEpW
wintrust
WinVerifyTrust
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ