AgentService.pdb
Static task
static1
Behavioral task
behavioral1
Sample
16f8c905869311f5ae6c56b3e32d7b60N.exe
General
-
Target
16f8c905869311f5ae6c56b3e32d7b60N.exe
-
Size
1.7MB
-
MD5
16f8c905869311f5ae6c56b3e32d7b60
-
SHA1
feb683093f4bedbe23d847cf8db1c8a7df577272
-
SHA256
f2751bb7cf894a9f6474ec6ddf97360fdb0799cface4098e10e1e33090008bd6
-
SHA512
114a8a1b04d3a8546293cd8f477a3943a3c1973e315f4bd84fbbf8491d996c61b9ad848bc71535f43abfd77cb270e2e1771444fc5fe4539ae1b4ae36e80a6c98
-
SSDEEP
49152:JL4Q3S9b6b1UA9MPCOR5c+e30jaNf1TWbdz:JL4QO4C5c+U023W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16f8c905869311f5ae6c56b3e32d7b60N.exe
Files
-
16f8c905869311f5ae6c56b3e32d7b60N.exe.exe windows:10 windows x64 arch:x64
41d93aed02d7a4dcb703dee9ebeb7f6c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
EventSetInformation
RegisterServiceCtrlHandlerW
SetServiceStatus
EventRegister
EventWriteTransfer
EventWrite
RegGetValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
EventUnregister
CreateProcessAsUserW
OpenProcessToken
SetTokenInformation
GetTokenInformation
RegQueryValueExW
ConvertSidToStringSidW
GetSidSubAuthority
GetSidSubAuthorityCount
AdjustTokenPrivileges
LookupPrivilegeValueW
DuplicateTokenEx
StartServiceCtrlDispatcherW
EqualSid
CreateWellKnownSid
GetNamedSecurityInfoW
RegSetKeyValueW
RegDeleteKeyExW
RegDeleteValueW
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
RegEnumKeyExW
RegDeleteTreeW
kernel32
GetShortPathNameW
QueryFullProcessImageNameW
lstrcmpiW
GetCurrentProcess
GetLastError
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
OutputDebugStringW
LocalLock
FormatMessageW
TlsGetValue
TlsAlloc
TlsSetValue
ResetEvent
WaitForSingleObjectEx
OpenEventA
FormatMessageA
AreFileApisANSI
GetCurrentDirectoryW
DeviceIoControl
CreateDirectoryW
CreateIoCompletionPort
FreeLibrary
GetProcAddress
LocalAlloc
GetProcessMitigationPolicy
GetModuleFileNameW
GetModuleHandleExW
SetLastError
lstrlenA
SystemTimeToFileTime
FindClose
FindNextFileW
FindFirstFileW
GetFileTime
GetFileSize
DeleteFileW
SetEvent
SetFileAttributesW
GetComputerNameExW
GetFileAttributesW
CreateFileW
ExpandEnvironmentStringsW
WriteFile
CreateEventA
GetProcessHeap
HeapAlloc
HeapFree
ReadFile
GetLocalTime
TerminateProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoW
InitializeCriticalSectionEx
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
CreateThread
GetSystemInfo
GetQueuedCompletionStatus
IsWow64Process
GetSystemWindowsDirectoryW
GetCurrentProcessId
CloseHandle
Sleep
ProcessIdToSessionId
OpenProcess
WaitForSingleObject
LocalUnlock
LocalFree
msvcrt
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
isdigit
isalnum
memcmp
___lc_collate_cp_func
memchr
tolower
isspace
_Strftime
_Gettnames
__mb_cur_max
_Wcsftime
_W_Gettnames
_W_Getmonths
_W_Getdays
_Getmonths
_Getdays
memcpy_s
ldexp
realloc
abort
_free_locale
_get_current_locale
__crtLCMapStringA
__crtLCMapStringW
__crtCompareStringA
__crtCompareStringW
??8type_info@@QEBAHAEBV0@@Z
_wcsdup
__uncaught_exception
islower
memset
_ismbblead
___mb_cur_max_func
calloc
___lc_codepage_func
___lc_handle_func
exit
__pctype_func
setlocale
_unlock
_lock
_errno
memcpy
_CxxThrowException
??0exception@@QEAA@AEBQEBDH@Z
_callnewh
malloc
sprintf_s
localeconv
?name@type_info@@QEBAPEBDXZ
??0exception@@QEAA@XZ
strcspn
free
??0exception@@QEAA@AEBV0@@Z
fclose
fwrite
fputc
fflush
fgetc
fgetpos
setvbuf
ungetc
fsetpos
_fseeki64
_wcsicmp
_wtoi
strchr
ldiv
time
_wcsnicmp
_stricmp
strerror
fseek
_wfsopen
mbstowcs_s
__CxxFrameHandler3
??_V@YAXPEAX@Z
memmove
_purecall
_exit
_cexit
__setusermatherr
_initterm
__C_specific_handler
_fmode
_commode
?terminate@@YAXXZ
__dllonexit
_onexit
??1type_info@@UEAA@XZ
??3@YAXPEAX@Z
isupper
??0exception@@QEAA@AEBQEBD@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
??0bad_cast@@QEAA@AEBV0@@Z
??0bad_cast@@QEAA@PEBD@Z
??1bad_cast@@UEAA@XZ
swprintf_s
wcscmp
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
ole32
CoInitializeEx
CoTaskMemFree
CLSIDFromProgID
OleRun
CoUninitialize
CoCreateInstance
CLSIDFromString
oleaut32
SysStringLen
SysFreeString
SysAllocString
SysAllocStringByteLen
VariantClear
wintrust
WinVerifyTrust
fltlib
FilterGetMessage
FilterReplyMessage
FilterConnectCommunicationPort
shell32
SHGetKnownFolderPath
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
activeds
ord3
Sections
.text Size: 767KB - Virtual size: 766KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 328KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE