ehSched.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7852a6845d5c6943779b00a7a00b4e80c1517a4b69621b62c7e06872107c601c.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7852a6845d5c6943779b00a7a00b4e80c1517a4b69621b62c7e06872107c601c.exe
Resource
win10v2004-20240704-en
General
-
Target
7852a6845d5c6943779b00a7a00b4e80c1517a4b69621b62c7e06872107c601c
-
Size
1.3MB
-
MD5
d061295b09a342900f648503db6281a8
-
SHA1
2bd07ed6057241782b5b4f1c9c1d421b0725dc4e
-
SHA256
7852a6845d5c6943779b00a7a00b4e80c1517a4b69621b62c7e06872107c601c
-
SHA512
fc3fc9b0c1d8d4192c9bc5bc310bfad8e62544c230eb07831f3cad8415ffc3eaed7092baa24760b9d173b8d4df2b3a4e9a4a6338fb1ef51a83ed56e24e62d250
-
SSDEEP
12288:8wXAwh+Ylc+pFByStv9JRa//inz86NRo1qiRlUWC4kXzVC3:vQwhrc+pFB5z+//ufNRoZW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7852a6845d5c6943779b00a7a00b4e80c1517a4b69621b62c7e06872107c601c
Files
-
7852a6845d5c6943779b00a7a00b4e80c1517a4b69621b62c7e06872107c601c.exe windows:6 windows x64 arch:x64
56bc9adcf5c93d8b8dc9fbe590f176c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegDeleteKeyW
RegQueryValueExW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CreateServiceW
ChangeServiceConfig2W
ControlService
DeleteService
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
GetAce
GetAclInformation
InitializeAcl
GetLengthSid
IsValidSid
LookupAccountNameW
OpenThreadToken
GetTokenInformation
SetSecurityDescriptorGroup
CopySid
SetNamedSecurityInfoW
LookupAccountSidW
SetSecurityDescriptorOwner
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityInfo
GetSecurityDescriptorDacl
CreateWellKnownSid
OpenProcessToken
kernel32
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CloseHandle
MultiByteToWideChar
CreateWaitableTimerW
CancelWaitableTimer
SetWaitableTimer
SetEvent
CreateEventW
CreateThread
WaitForSingleObject
ExitThread
ResetEvent
GetCurrentThreadId
CreateEventExW
OpenThread
WaitForMultipleObjects
HeapSetInformation
GetCommandLineW
GetCurrentThread
QueryPerformanceCounter
GetTickCount64
QueryPerformanceFrequency
QueueUserWorkItem
GetSystemTimeAsFileTime
OutputDebugStringA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetTickCount
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
GetVersionExA
RaiseException
lstrcmpiW
GetModuleHandleW
LoadLibraryW
GetProcAddress
GetLastError
lstrlenW
FreeLibrary
GetProcessHeap
HeapFree
HeapAlloc
InitializeCriticalSection
EncodeSystemPointer
LocalFree
OutputDebugStringW
GetLocalTime
user32
UnregisterClassA
PostThreadMessageW
UnregisterDeviceNotification
RegisterDeviceNotificationW
DispatchMessageW
PeekMessageW
MsgWaitForMultipleObjectsEx
CharNextW
msvcrt
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
realloc
_errno
_amsg_exit
_initterm
fflush
exit
_cexit
_exit
_XcptFilter
__wgetmainargs
__CxxFrameHandler3
_CxxThrowException
__C_specific_handler
memset
_vsnwprintf
?what@exception@@UEBAPEBDXZ
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
??0exception@@QEAA@AEBQEBD@Z
memmove_s
calloc
_resetstkoflw
_wcsnicmp
wcscat_s
wcscpy_s
memcpy_s
free
malloc
wcsncpy_s
fputws
??1type_info@@UEAA@XZ
_onexit
_lock
__dllonexit
_wcmdln
_unlock
_purecall
memcpy
ole32
CoInitializeSecurity
CoRevertToSelf
CoSetProxyBlanket
CoImpersonateClient
CoInitialize
CoReleaseServerProcess
CoRegisterClassObject
CoUninitialize
CoRevokeClassObject
CoInitializeEx
CoAddRefServerProcess
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
oleaut32
VarUI4FromStr
SysFreeString
slc
SLGetWindowsInformationDWORD
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE