ieetwcollector.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a92e4d14e399d4c39783d1173ad6dd77df4ea20663f5f1c713066e736851589e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a92e4d14e399d4c39783d1173ad6dd77df4ea20663f5f1c713066e736851589e.exe
Resource
win10v2004-20240426-en
General
-
Target
a92e4d14e399d4c39783d1173ad6dd77df4ea20663f5f1c713066e736851589e
-
Size
1.3MB
-
MD5
0237bd802ff361d58cf91b7925bcefbd
-
SHA1
4b98455ff1411ed1826e95bee33918932df8f27e
-
SHA256
a92e4d14e399d4c39783d1173ad6dd77df4ea20663f5f1c713066e736851589e
-
SHA512
0fa00f1e2c40d040042cd73a844e422ce327638426161c48e933b9c0f1299c92956cd65877ab3f7fadc126c1f3b159f6a4813c239168850026b10cebb5db66d3
-
SSDEEP
24576:glaR/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:glaRLNiXicJFFRGNzj3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a92e4d14e399d4c39783d1173ad6dd77df4ea20663f5f1c713066e736851589e
Files
-
a92e4d14e399d4c39783d1173ad6dd77df4ea20663f5f1c713066e736851589e.exe windows:6 windows x86 arch:x86
07ee58ba61a12b6b223353828639a122
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
SetThreadToken
RevertToSelf
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetNamedSecurityInfoW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
ConvertStringSidToSidW
SetEntriesInAclW
SetNamedSecurityInfoW
SetServiceStatus
RegisterServiceCtrlHandlerExW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
StartServiceW
CloseServiceHandle
StartServiceCtrlDispatcherW
CreateServiceW
QueryServiceConfig2W
ChangeServiceConfig2W
DeleteService
ControlService
RegCreateKeyExW
RegSetValueExW
RegCloseKey
EventRegister
EventUnregister
EventWrite
OpenThreadToken
StartTraceW
ControlTraceW
EnableTraceEx2
TraceSetInformation
kernel32
GetCurrentThreadId
UnregisterWaitEx
OpenProcess
GetLastError
RegisterWaitForSingleObject
CreateThread
GetFileAttributesW
DeleteFileW
WaitForSingleObject
CloseHandle
GetTempPathW
GetCurrentProcess
LocalFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LoadLibraryExW
GetProcAddress
FreeLibrary
QueryPerformanceCounter
SetEvent
CreateEventW
GetModuleFileNameW
GetCurrentProcessId
GetComputerNameExW
QueryPerformanceFrequency
GetCurrentThread
GetVersionExW
ExpandEnvironmentStringsW
CreateDirectoryW
RemoveDirectoryW
CreateFileA
WriteConsoleW
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
VirtualQuery
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
WideCharToMultiByte
GetVersionExA
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
HeapAlloc
HeapFree
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
ExitProcess
GetStdHandle
WriteFile
GetModuleFileNameA
HeapCreate
VirtualFree
GetFileType
SetHandleCount
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCommandLineW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringA
HeapReAlloc
HeapSize
VirtualAlloc
Sleep
InitializeCriticalSectionAndSpinCount
LoadLibraryExA
RtlUnwind
GetLocaleInfoA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
ole32
CoImpersonateClient
CoSuspendClassObjects
CoRevokeClassObject
CoResumeClassObjects
CoRegisterClassObject
CoInitializeSecurity
StringFromGUID2
CoCreateGuid
CoUninitialize
CoCreateInstance
CoInitializeEx
CoRevertToSelf
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocString
shlwapi
SHDeleteKeyW
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE