TrustedInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
82c73f2ff621f7e4abd03968cf193ab14d05622d77818a6485fd59564667f666.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
82c73f2ff621f7e4abd03968cf193ab14d05622d77818a6485fd59564667f666.exe
Resource
win10v2004-20240508-en
General
-
Target
82c73f2ff621f7e4abd03968cf193ab14d05622d77818a6485fd59564667f666
-
Size
226KB
-
MD5
9c884f252f0040217c88a867eb6d8e1a
-
SHA1
17ddc0288a9209fbe426489094e8d97f3100977e
-
SHA256
82c73f2ff621f7e4abd03968cf193ab14d05622d77818a6485fd59564667f666
-
SHA512
5b519eca914f0d2d02a3da6fccf7b6f419fd3f94c8ea308619fd404750e2b7ad1cd3ecf361ca6577332be762b9d856ba5b997b92e7991d09b073ff02da90b2ea
-
SSDEEP
3072:UXEgwW6ntfESQHtidszHi3YHHrhFdHqRRzAFHjmssqRBPAcY00J94:UXE0MESQNiq7ioHH1G/zAnsqPPGhJ94
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82c73f2ff621f7e4abd03968cf193ab14d05622d77818a6485fd59564667f666
Files
-
82c73f2ff621f7e4abd03968cf193ab14d05622d77818a6485fd59564667f666.exe windows:6 windows x86 arch:x86
eb3d4b4843183a5b71eaed184f4ed764
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
SetServiceStatus
RegCloseKey
RegOpenKeyExW
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
OpenProcessToken
RegOpenKeyW
RegCreateKeyExW
RegDeleteKeyW
CloseServiceHandle
InitiateShutdownW
LookupPrivilegeValueW
AdjustTokenPrivileges
ChangeServiceConfigW
QueryServiceConfigW
OpenSCManagerW
OpenServiceW
RegQueryValueExW
RegEnumValueW
kernel32
LoadLibraryW
GetSystemDirectoryW
GetTickCount
QueryPerformanceCounter
CreateDirectoryW
ExpandEnvironmentStringsW
GetFullPathNameW
GetFileAttributesExW
GetProcAddress
GetFileAttributesW
GetVersionExW
lstrlenW
GetEnvironmentVariableW
GetSystemTime
MoveFileExW
GetWindowsDirectoryW
CreateProcessW
CreateFileW
SetFileTime
GetExitCodeProcess
FindFirstFileW
CompareFileTime
FindNextFileW
DeleteFileW
FindClose
OutputDebugStringA
UnhandledExceptionFilter
TerminateProcess
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
GetSystemTimeAsFileTime
GetCurrentProcessId
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpW
ExitProcess
HeapSetInformation
CreateEventW
GetLastError
CreateThread
WaitForMultipleObjects
TerminateThread
WaitForSingleObject
GetExitCodeThread
CloseHandle
SetEvent
InterlockedExchange
GetCurrentThreadId
msvcrt
__set_app_type
wcstoul
??2@YAPAXI@Z
_vsnwprintf
_vsnprintf
memset
memcpy
??3@YAXPAX@Z
__wgetmainargs
_cexit
_exit
_controlfp
_except_handler4_common
?terminate@@YAXXZ
wcsrchr
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
ole32
CoDisconnectContext
CoRevokeClassObject
CoSuspendClassObjects
CoCreateInstance
CoRegisterClassObject
CoInitializeSecurity
CoInitializeEx
CoGetMalloc
CoUninitialize
CoResumeClassObjects
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE