D:\Program Files (x86)\MySQLConf\Release_2019\Pdb\MySQLWatchDog.pdb
Static task
static1
Behavioral task
behavioral1
Sample
00eeadce64574590c6b546780dcca7b5907481da0c2b8d439b8d465b5ea253c3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
00eeadce64574590c6b546780dcca7b5907481da0c2b8d439b8d465b5ea253c3.exe
Resource
win10v2004-20240704-en
General
-
Target
00eeadce64574590c6b546780dcca7b5907481da0c2b8d439b8d465b5ea253c3
-
Size
291KB
-
MD5
54c3236f31041d56ee1681db8286d052
-
SHA1
bb269ec014c99c0e12cea89b46451daa0138e177
-
SHA256
00eeadce64574590c6b546780dcca7b5907481da0c2b8d439b8d465b5ea253c3
-
SHA512
3c626e6a444f1a34e270200c76d9112c635e3cbcd0f921a28816afeab76cb2fecb5a6233960d0d4be1bcbfb6b7be8dcc32f9faf608de73ee8846589ad29bd91a
-
SSDEEP
6144:g7WuIaHvHBURLcumgQkfsdc+nDLbURohRAMZcF8c:/ujHvBURLW1kUdZbURoV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00eeadce64574590c6b546780dcca7b5907481da0c2b8d439b8d465b5ea253c3
Files
-
00eeadce64574590c6b546780dcca7b5907481da0c2b8d439b8d465b5ea253c3.exe windows:6 windows x64 arch:x64
2e3b5993cffaf296b964af9c82b09ec0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
wsprintfW
advapi32
StartServiceW
DeregisterEventSource
SetServiceStatus
ChangeServiceConfig2W
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
RegisterEventSourceW
ReportEventW
OpenSCManagerW
OpenServiceW
CloseServiceHandle
CreateServiceW
DeleteService
LookupPrivilegeValueW
ControlService
QueryServiceStatus
QueryServiceStatusEx
EnumServicesStatusExW
OpenProcessToken
AdjustTokenPrivileges
shlwapi
StrStrW
shell32
CommandLineToArgvW
kernel32
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
HeapSize
SetEndOfFile
WriteConsoleW
InitializeSRWLock
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapReAlloc
GetConsoleOutputCP
FlushFileBuffers
GetCurrentThreadId
CloseHandle
GetCurrentProcess
GetLastError
CreateMutexW
GetCommandLineW
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetLocalTime
WaitForSingleObject
CreateEventW
Sleep
SetEvent
CreateThread
ResetEvent
GetPrivateProfileIntW
GetPrivateProfileStringW
CreateDirectoryW
FindFirstFileW
GetFileSizeEx
FindNextFileW
FindClose
CreateFileW
TerminateProcess
GetProcAddress
GetModuleHandleW
GetTickCount
RtlUnwind
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
GetStringTypeW
QueryPerformanceCounter
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
GetCPInfo
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
ReadConsoleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ReadFile
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetCommandLineA
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetFileType
SetFilePointerEx
GetConsoleMode
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ