mdsched.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3612cd9a1ddb92935260dac5ddbf1f9e8681bf94994b0d8fc0421e6ed4e2a176.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3612cd9a1ddb92935260dac5ddbf1f9e8681bf94994b0d8fc0421e6ed4e2a176.exe
Resource
win10v2004-20240508-en
General
-
Target
3612cd9a1ddb92935260dac5ddbf1f9e8681bf94994b0d8fc0421e6ed4e2a176
-
Size
129KB
-
MD5
63fdd18d600d4567c13f960a2ffc089d
-
SHA1
6beb59c548c53ea1f6e21ebc6cd061d279ac48b7
-
SHA256
3612cd9a1ddb92935260dac5ddbf1f9e8681bf94994b0d8fc0421e6ed4e2a176
-
SHA512
434cecc6f8a51cb69e9e458d512b7db8841c82a59d96917d51336105410ffb6a58d24545e923eb196926bf472e99d8bdaea3cd1866666ff62f246b9d056ecc27
-
SSDEEP
3072:hMZMvwMmg+HGBvr5zpe/FO+VQDUcUNWs+jm6xl:nvZmN2u/FfMBghAm2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3612cd9a1ddb92935260dac5ddbf1f9e8681bf94994b0d8fc0421e6ed4e2a176
Files
-
3612cd9a1ddb92935260dac5ddbf1f9e8681bf94994b0d8fc0421e6ed4e2a176.exe windows:6 windows x86 arch:x86
8def2fd45bd1068ad1d4a602f14e6160
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
TraceMessage
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
InitiateShutdownW
EventWrite
EventRegister
RegCloseKey
RegSetValueExW
RegCreateKeyExW
EventUnregister
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetCurrentProcess
CloseHandle
HeapSetInformation
GetModuleHandleW
GetLastError
CompareStringW
TerminateProcess
user32
LoadStringW
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??2@YAPAXI@Z
memset
??3@YAXPAX@Z
_vsnwprintf
_initterm
swprintf_s
wcstoul
_wcsnicmp
memcpy
wcscat_s
wcscpy_s
_ultow_s
wcschr
_wcsicmp
wcsrchr
wcsstr
wcsnlen
strncmp
_wcsupr
_snwscanf_s
_wcslwr
ntdll
RtlAllocateHeap
NtClose
NtOpenFile
RtlInitUnicodeString
RtlGUIDFromString
NtQuerySystemInformation
RtlFreeUnicodeString
RtlStringFromGUID
NtWaitForSingleObject
NtDeviceIoControlFile
NtCreateEvent
NtOpenKey
NtEnumerateKey
NtQueryKey
NtQueryAttributesFile
NtUnloadKey
NtLoadKey
NtAdjustPrivilegesToken
NtOpenProcessToken
NtOpenThreadToken
RtlFreeSid
RtlSetOwnerSecurityDescriptor
RtlLengthSecurityDescriptor
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
RtlAddAccessAllowedAceEx
RtlCreateAcl
RtlLengthSid
RtlAllocateAndInitializeSid
NtSetSecurityObject
NtCreateKey
NtDeleteValueKey
NtQueryValueKey
NtSetValueKey
NtDeleteKey
LdrGetProcedureAddress
RtlInitAnsiString
LdrGetDllHandle
NtResetEvent
RtlGetVersion
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
NtAllocateUuids
RtlFreeHeap
WinSqmAddToStream
comctl32
ord345
oleaut32
SysAllocString
SysFreeString
ole32
CoCreateInstance
CoInitialize
CoUninitialize
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 948B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE