SCardSvr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e854bc358f2d317192602d0783da9e61521411eeadd973632ad5d15feb47d405.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
e854bc358f2d317192602d0783da9e61521411eeadd973632ad5d15feb47d405.exe
Resource
win10v2004-20240508-en
General
-
Target
e854bc358f2d317192602d0783da9e61521411eeadd973632ad5d15feb47d405
-
Size
110KB
-
MD5
4a36a8714b89da86979e30bd6fad9d94
-
SHA1
117a694c299fce21acbe485c10ada1af5abdbd62
-
SHA256
e854bc358f2d317192602d0783da9e61521411eeadd973632ad5d15feb47d405
-
SHA512
c8522133b5091cb0fa0e9a026b9919d938df97141d7bac4cefe8b88b232f2b6ca0279d744bc86cde146f0cc1617d7b126355672e2b9e3f0419f346ff334fe7d5
-
SSDEEP
3072:KWsSDT6U3m+/BSBpR8clKm2ruFVCkDae1hDO6P:+kWCm+/c7R8Hm2ruh1c6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e854bc358f2d317192602d0783da9e61521411eeadd973632ad5d15feb47d405
Files
-
e854bc358f2d317192602d0783da9e61521411eeadd973632ad5d15feb47d405.exe windows:5 windows x86 arch:x86
ab97a11f1a35fac580d7ba2691a1b76a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__getmainargs
__CxxFrameHandler
_CxxThrowException
_ultoa
?terminate@@YAXXZ
_onexit
__dllonexit
_controlfp
??1type_info@@UAE@XZ
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
??3@YAXPAX@Z
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
printf
puts
?set_terminate@@YAP6AXXZP6AXXZ@Z
??2@YAPAXI@Z
kernel32
UnhandledExceptionFilter
WriteFile
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
SetLastError
RaiseException
LoadLibraryA
InterlockedExchange
FreeLibrary
GetProcAddress
CreateFileA
SetThreadPriority
CreateWaitableTimerA
SetWaitableTimer
CancelWaitableTimer
DeviceIoControl
GetOverlappedResult
WaitForMultipleObjects
OpenProcess
DuplicateHandle
CreateThread
ResumeThread
PulseEvent
GetProcessHeap
HeapAlloc
lstrcpyA
OpenEventA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
GetLastError
lstrlenA
Sleep
CloseHandle
WaitForSingleObject
CreateEventA
ExpandEnvironmentStringsA
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
ReadFile
SetUnhandledExceptionFilter
GetModuleHandleA
lstrcmpiA
FormatMessageA
LocalAlloc
LocalFree
MultiByteToWideChar
GetACP
WideCharToMultiByte
lstrlenW
ntdll
strpbrk
_strnicmp
isgraph
sprintf
_itoa
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE