C:\j\workspace\EPOSConnect\BuildConnectAppsAgent\skipper\bin\EPOS-windows-x86-release-dynamic-full\AutoLaunch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
39a5bb2b5d646b76cd5580141dc585b1312e1ce93767801cbaf11789c18497ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39a5bb2b5d646b76cd5580141dc585b1312e1ce93767801cbaf11789c18497ba.exe
Resource
win10v2004-20240426-en
General
-
Target
39a5bb2b5d646b76cd5580141dc585b1312e1ce93767801cbaf11789c18497ba
-
Size
23KB
-
MD5
b1645c398140ca7d608b485c775952ab
-
SHA1
5171145549f78bc7e8645dc7b3ee043dccef5f68
-
SHA256
39a5bb2b5d646b76cd5580141dc585b1312e1ce93767801cbaf11789c18497ba
-
SHA512
c542b2a72d2b6fbb78de321c2ac05f8e1f04bbfe72158af838728ec2f6bb3cabe5a2f7525d1399c613dfcc1593c39a0f919ca2ba5d0d78f218ce1906029a0321
-
SSDEEP
384:Nxol8mBR8UMnzdwLCRBmCs1tWQ2HrvjTwSNZcutlGYJGEFxOwaq:AZR8U6lRB0urv3TOXq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39a5bb2b5d646b76cd5580141dc585b1312e1ce93767801cbaf11789c18497ba
Files
-
39a5bb2b5d646b76cd5580141dc585b1312e1ce93767801cbaf11789c18497ba.exe windows:6 windows x86 arch:x86
1c38a6ff706c93992bbac2fb6b4737af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
agentutil
?getEnvironmentVariable@StringUtil@eposconnect@epos@@SA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@V?$basic_string_view@DU?$char_traits@D@std@@@5@@Z
cpprest_2_10
?to_utf16string@conversions@utility@@YA?AV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@4@@Z
userenv
CreateEnvironmentBlock
kernel32
GetLastError
GetCurrentProcess
OpenProcess
QueryPerformanceCounter
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
CloseHandle
IsWow64Process
GetModuleHandleW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
InitializeSListHead
advapi32
RevertToSelf
ImpersonateLoggedOnUser
OpenProcessToken
CreateProcessAsUserW
msvcp140
?_Xlength_error@std@@YAXPBD@Z
vcruntime140
__current_exception_context
__std_exception_destroy
memset
__std_exception_copy
__std_type_info_destroy_list
_except_handler4_common
__current_exception
_CxxThrowException
memmove
__CxxFrameHandler3
memcpy
api-ms-win-crt-runtime-l1-1-0
_get_initial_narrow_environment
_initterm
_initterm_e
_exit
_seh_filter_dll
_seh_filter_exe
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_cexit
_crt_at_quick_exit
_crt_atexit
_execute_onexit_table
terminate
_controlfp_s
exit
_invalid_parameter_noinfo_noreturn
_register_onexit_function
_initialize_onexit_table
__p___argc
_configure_narrow_argv
_set_app_type
_initialize_narrow_environment
api-ms-win-crt-string-l1-1-0
_wcsicmp
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
__p__commode
_set_fmode
__stdio_common_vfwprintf
api-ms-win-crt-heap-l1-1-0
malloc
free
_callnewh
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ