d:\manami_V12L42_Prototype\manami\release\updnvsrv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
24f226ad3c4d1f90f7a79223c3e6fda0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
24f226ad3c4d1f90f7a79223c3e6fda0N.exe
Resource
win10v2004-20240709-en
General
-
Target
24f226ad3c4d1f90f7a79223c3e6fda0N.exe
-
Size
12KB
-
MD5
24f226ad3c4d1f90f7a79223c3e6fda0
-
SHA1
11b7ec222b32733eaaa4744cc42fe226272b4db7
-
SHA256
28b6f8dbd2844b81c0610b9f97264edc02bc57bfaf17966ed4ee719b387869e3
-
SHA512
74ad22c72ed6b7608da59f4b1f5cbd0303cd0c31bd02d7709198eb484bcaa75825156b1eba65c27400824c4c8a54779d73bb4a0b3044a73ff05ed22802d96d7d
-
SSDEEP
192:FIwPP15I2nL0LznXJ/qb4qdlergiDnGz/4MTc4rOFcqEpOWlx2/TB6:FIw158Lznkb4cErFnG8MTbOFcJO/k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24f226ad3c4d1f90f7a79223c3e6fda0N.exe
Files
-
24f226ad3c4d1f90f7a79223c3e6fda0N.exe.exe windows:4 windows x86 arch:x86
69736a38432cb7be80f82d756384977f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcessId
QueryPerformanceCounter
ResetEvent
GetTickCount
GetProcAddress
Sleep
SetEvent
GetLastError
lstrcpyW
WaitForSingleObject
LoadLibraryW
CreateEventW
CloseHandle
GetModuleFileNameW
GetCurrentThreadId
lstrcatW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
GetSystemTimeAsFileTime
user32
PostMessageW
FindWindowW
advapi32
StartServiceCtrlDispatcherW
SetServiceStatus
OpenSCManagerW
RegisterServiceCtrlHandlerExW
DeleteService
InitializeSecurityDescriptor
QueryServiceStatus
StartServiceW
OpenServiceW
CloseServiceHandle
QueryServiceStatusEx
ControlService
SetSecurityDescriptorDacl
CreateServiceW
msvcr80
??3@YAXPAX@Z
_wsplitpath_s
wcscat_s
_waccess_s
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
__winitenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
vswprintf_s
_time64
_localtime64_s
wcsftime
fclose
_wcsicmp
fputws
_wfopen_s
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ