dismhost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
afded2032cff42b067f325bacc5f1300da6b4d4918471ae3233b178b3c4ee0e1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
afded2032cff42b067f325bacc5f1300da6b4d4918471ae3233b178b3c4ee0e1.exe
Resource
win10v2004-20240426-en
General
-
Target
afded2032cff42b067f325bacc5f1300da6b4d4918471ae3233b178b3c4ee0e1
-
Size
108KB
-
MD5
ff12a0640fff97403d75c6f49e650668
-
SHA1
cda72bd48d379415742ffe24e6a69f2344fbfdfb
-
SHA256
afded2032cff42b067f325bacc5f1300da6b4d4918471ae3233b178b3c4ee0e1
-
SHA512
3cc809ab77a45bce3efe617d22441c40c5b78b05c1f76cb7be9f6a72bb11a4bf17b23e57e380e52c87a5dff8302e14d6c7e64fca72055058f8c42de55c8f1b47
-
SSDEEP
1536:zBje6vhXNqcOg0u/W1UMZ3jShDHs0vHlOx1bL5v4AbwHd4Gnpi+LH6nPj8bgxXkG:zphcg0u/se7vH2F4AbwHfpZaj8ku
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afded2032cff42b067f325bacc5f1300da6b4d4918471ae3233b178b3c4ee0e1
Files
-
afded2032cff42b067f325bacc5f1300da6b4d4918471ae3233b178b3c4ee0e1.exe windows:6 windows x86 arch:x86
65da69c322bee29bc5e70779a230cac7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
advapi32
AddAce
InitializeAcl
GetSecurityDescriptorControl
MakeAbsoluteSD
GetSecurityDescriptorSacl
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
GetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetLengthSid
IsValidSid
CopySid
GetAclInformation
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
IsValidSecurityDescriptor
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
kernel32
OutputDebugStringW
SearchPathW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
GetLocaleInfoW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
SetLastError
GetModuleFileNameW
LeaveCriticalSection
EnterCriticalSection
lstrlenW
OpenEventW
WaitForMultipleObjects
ExitProcess
LocalFree
SetEvent
GetCurrentThreadId
GetModuleHandleW
CreateEventW
CreateThread
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetFileAttributesW
GetModuleHandleExW
GetSystemWindowsDirectoryW
GetVersionExW
GetFullPathNameW
LoadLibraryW
GetSystemDirectoryW
CreateFileW
GetProcAddress
FreeLibrary
FindResourceExW
LoadResource
FormatMessageW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
OutputDebugStringA
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetVersionExA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
RaiseException
WaitForSingleObject
CloseHandle
SetThreadUILanguage
GetCommandLineW
Sleep
GetLastError
user32
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
LoadStringW
UnregisterClassA
msvcrt
_write
_lseeki64
_fileno
__pioinfo
__badioinfo
ferror
wctomb
_itoa
_snprintf
_iob
_isatty
isleadbyte
__mb_cur_max
mbtowc
_controlfp
memmove
memcpy
_onexit
_lock
__dllonexit
_unlock
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__set_app_type
wcsncmp
_wcsnicmp
bsearch
_vsnwprintf
_vscprintf
_vscwprintf
wcschr
wcsrchr
_CxxThrowException
_purecall
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_callnewh
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??0exception@@QAE@XZ
_errno
__CxxFrameHandler
_beginthreadex
_wcsicmp
memset
calloc
malloc
free
ntdll
RtlFreeHeap
RtlUnwind
RtlAllocateHeap
ole32
CoInitializeEx
CoUninitialize
CoSuspendClassObjects
CoInitializeSecurity
ProgIDFromCLSID
CoCreateInstance
CoRegisterClassObject
CLSIDFromString
CoRevokeClassObject
CoRegisterPSClsid
CoTaskMemFree
oleaut32
LoadTypeLi
LoadRegTypeLi
SysStringLen
CreateErrorInfo
SetErrorInfo
SysAllocString
SysFreeString
SysAllocStringLen
shell32
CommandLineToArgvW
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 34KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE