SCardSvr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b1213cf529597cfe03a650310af204068b890006acc4ca345704d579f842358c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b1213cf529597cfe03a650310af204068b890006acc4ca345704d579f842358c.exe
Resource
win10v2004-20240508-en
General
-
Target
b1213cf529597cfe03a650310af204068b890006acc4ca345704d579f842358c
-
Size
110KB
-
MD5
256d8052c2e2b6ae6384fe186e8129f8
-
SHA1
25d75f95e7821d4ee782e303bd673e6032693be9
-
SHA256
b1213cf529597cfe03a650310af204068b890006acc4ca345704d579f842358c
-
SHA512
a7e56eea420585fd619a70d8fc1909ec101a040aacd2571f8bedc125955ed7665489e93833df3c61c6a3619d6e700aa00e601f2aca030f5155558fafc1a9bedd
-
SSDEEP
3072:KWsSDT6U3m+/BSBpR8clKm2ruFVCkDa0nVpEIy0:+kWCm+/c7R8Hm2runV3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1213cf529597cfe03a650310af204068b890006acc4ca345704d579f842358c
Files
-
b1213cf529597cfe03a650310af204068b890006acc4ca345704d579f842358c.exe windows:5 windows x86 arch:x86
ab97a11f1a35fac580d7ba2691a1b76a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__getmainargs
__CxxFrameHandler
_CxxThrowException
_ultoa
?terminate@@YAXXZ
_onexit
__dllonexit
_controlfp
??1type_info@@UAE@XZ
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
??3@YAXPAX@Z
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
printf
puts
?set_terminate@@YAP6AXXZP6AXXZ@Z
??2@YAPAXI@Z
kernel32
UnhandledExceptionFilter
WriteFile
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
SetLastError
RaiseException
LoadLibraryA
InterlockedExchange
FreeLibrary
GetProcAddress
CreateFileA
SetThreadPriority
CreateWaitableTimerA
SetWaitableTimer
CancelWaitableTimer
DeviceIoControl
GetOverlappedResult
WaitForMultipleObjects
OpenProcess
DuplicateHandle
CreateThread
ResumeThread
PulseEvent
GetProcessHeap
HeapAlloc
lstrcpyA
OpenEventA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
GetLastError
lstrlenA
Sleep
CloseHandle
WaitForSingleObject
CreateEventA
ExpandEnvironmentStringsA
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
ReadFile
SetUnhandledExceptionFilter
GetModuleHandleA
lstrcmpiA
FormatMessageA
LocalAlloc
LocalFree
MultiByteToWideChar
GetACP
WideCharToMultiByte
lstrlenW
ntdll
strpbrk
_strnicmp
isgraph
sprintf
_itoa
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE