U:\develop\global\Release\bin\common\WSCommCntr1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ea5b619101e98430e7a4add218be1cce9389fb1050645ca6a0210dac5f2e3323.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea5b619101e98430e7a4add218be1cce9389fb1050645ca6a0210dac5f2e3323.exe
Resource
win10v2004-20240508-en
General
-
Target
ea5b619101e98430e7a4add218be1cce9389fb1050645ca6a0210dac5f2e3323
-
Size
209KB
-
MD5
bf70f2d320d0560fd87cd43277474b5a
-
SHA1
083cddfac9d948a86d7217038c4109f12b6586d6
-
SHA256
ea5b619101e98430e7a4add218be1cce9389fb1050645ca6a0210dac5f2e3323
-
SHA512
ff27325cbbfdafb6550bbf8657e5f0203c8c108bdba9af1a8b2f8729386ca93cd89b6741d3206e87f769b251413b59ff3916b977637aef44f54037acdac4beea
-
SSDEEP
3072:U9j0584NYSOAaw4Qjn4BZlxH+Hg0IQNCF4BHBOrs1osiy7kOOvYral//DnESZcmd:e7y1pahZltsdIQ511kOOvF7ESZczkVH7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea5b619101e98430e7a4add218be1cce9389fb1050645ca6a0210dac5f2e3323
Files
-
ea5b619101e98430e7a4add218be1cce9389fb1050645ca6a0210dac5f2e3323.exe windows:4 windows x86 arch:x86
14a4fe2f11823efe391ba9e2ba824c4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LeaveCriticalSection
LocalAlloc
FormatMessageW
GetFileAttributesW
CreateDirectoryW
OpenProcess
CloseHandle
LocalFree
DeleteFileW
SetEvent
CreateEventW
CreateThread
WaitForSingleObject
CreateWaitableTimerW
SetWaitableTimer
WaitForMultipleObjects
InterlockedDecrement
GetCurrentThreadId
GetModuleHandleW
RaiseException
GetCommandLineW
Sleep
GetLastError
GetVersionExA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetModuleFileNameW
CancelWaitableTimer
lstrlenW
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
user32
SetTimer
CharUpperBuffW
PostThreadMessageW
CharUpperW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
UnregisterClassA
advapi32
RegDeleteKeyW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
shell32
SHGetFolderPathW
ole32
CLSIDFromString
CoDisconnectObject
CoCreateInstance
CoRegisterClassObject
CoInitializeEx
CoUninitialize
CoInitialize
CoRevokeClassObject
StringFromGUID2
oleaut32
UnRegisterTypeLi
RegisterTypeLi
VarBstrCat
VariantChangeType
SysAllocStringLen
VariantCopy
VariantClear
SafeArrayLock
SafeArrayCreate
SafeArrayRedim
VarBstrCmp
SafeArrayUnlock
SafeArrayDestroy
SafeArrayCopy
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayGetLBound
VariantInit
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysStringLen
SysAllocString
SysAllocStringByteLen
SysStringByteLen
msvcr80
__CxxFrameHandler3
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
__dllonexit
_encode_pointer
_CxxThrowException
??3@YAXPAX@Z
??_U@YAPAXI@Z
??_V@YAXPAX@Z
free
??2@YAPAXI@Z
_purecall
memcpy_s
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
_wtol
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
?what@exception@std@@UBEPBDXZ
memmove_s
swprintf_s
_swprintf
_recalloc
calloc
malloc
wcsstr
_wtoi
_resetstkoflw
_wtoi64
_localtime64
_time64
wcsftime
wcsncpy_s
wcscat_s
wcscpy_s
memset
?terminate@@YAXXZ
_unlock
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE