ehSched.pdb
Static task
static1
Behavioral task
behavioral1
Sample
66bd3db09a3cd97a8b642a865689c6ff377580754bca17cdb0871cc3f57eadca.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
66bd3db09a3cd97a8b642a865689c6ff377580754bca17cdb0871cc3f57eadca.exe
Resource
win10v2004-20240508-en
General
-
Target
66bd3db09a3cd97a8b642a865689c6ff377580754bca17cdb0871cc3f57eadca
-
Size
1.6MB
-
MD5
f6b32c239c84d4724ae7dbce5c76b620
-
SHA1
d283add0d431e02d061bba28e13137a8d613a4a8
-
SHA256
66bd3db09a3cd97a8b642a865689c6ff377580754bca17cdb0871cc3f57eadca
-
SHA512
1ddf6fedd3ec8eb2163ad05f98c5f2163b21e18cadc7abbcfe0824d86f5c6654cc1c8805884ca91d2c78ddf96c82aa115334cb040d59502bdec51e808256b76c
-
SSDEEP
12288:VwXAwhkOdlI7KcBBxeXZY7Zoxxau7gnijY5C1uP8xwB:OQwhqZGXkHu7gi05yu5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66bd3db09a3cd97a8b642a865689c6ff377580754bca17cdb0871cc3f57eadca
Files
-
66bd3db09a3cd97a8b642a865689c6ff377580754bca17cdb0871cc3f57eadca.exe windows:6 windows x64 arch:x64
56bc9adcf5c93d8b8dc9fbe590f176c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegDeleteKeyW
RegQueryValueExW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CreateServiceW
ChangeServiceConfig2W
ControlService
DeleteService
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
GetAce
GetAclInformation
InitializeAcl
GetLengthSid
IsValidSid
LookupAccountNameW
OpenThreadToken
GetTokenInformation
SetSecurityDescriptorGroup
CopySid
SetNamedSecurityInfoW
LookupAccountSidW
SetSecurityDescriptorOwner
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorDacl
CreateWellKnownSid
OpenProcessToken
kernel32
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
MultiByteToWideChar
CreateWaitableTimerW
CancelWaitableTimer
SetWaitableTimer
SetEvent
CreateEventW
CreateThread
WaitForSingleObject
ExitThread
ResetEvent
GetCurrentThreadId
CreateEventExW
OpenThread
WaitForMultipleObjects
HeapSetInformation
GetCommandLineW
GetCurrentThread
QueryPerformanceCounter
GetTickCount64
QueryPerformanceFrequency
QueueUserWorkItem
GetSystemTimeAsFileTime
OutputDebugStringA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetTickCount
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
GetVersionExA
RaiseException
lstrcmpiW
GetModuleHandleW
LoadLibraryW
GetProcAddress
GetLastError
lstrlenW
FreeLibrary
GetProcessHeap
HeapFree
HeapAlloc
InitializeCriticalSection
EncodeSystemPointer
LocalFree
OutputDebugStringW
GetLocalTime
user32
UnregisterClassA
PostThreadMessageW
UnregisterDeviceNotification
RegisterDeviceNotificationW
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjectsEx
CharNextW
msvcrt
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
realloc
_errno
_amsg_exit
_initterm
fflush
exit
_cexit
_exit
_XcptFilter
__wgetmainargs
__CxxFrameHandler3
_CxxThrowException
__C_specific_handler
memset
_vsnwprintf
?what@exception@@UEBAPEBDXZ
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
memmove_s
calloc
_resetstkoflw
_wcsnicmp
wcscat_s
wcscpy_s
memcpy_s
free
malloc
wcsncpy_s
fputws
??1type_info@@UEAA@XZ
_onexit
_lock
__dllonexit
_wcmdln
_unlock
_purecall
memcpy
ole32
CoInitializeSecurity
CoRevertToSelf
CoSetProxyBlanket
CoImpersonateClient
CoInitialize
CoReleaseServerProcess
CoRegisterClassObject
CoUninitialize
CoRevokeClassObject
CoInitializeEx
CoAddRefServerProcess
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
SysFreeString
slc
SLGetWindowsInformationDWORD
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE