E:\gitlab\builds\yyT_Ky8z\0\marshal\cloudinputsetup\Release\CloudInputUpdateSvr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cc7d6c04c61434029006adfb78c8e0d8bc82e2a86e1165d21f2063922e40f6ce.exe
Resource
win7-20240704-en
General
-
Target
cc7d6c04c61434029006adfb78c8e0d8bc82e2a86e1165d21f2063922e40f6ce
-
Size
2.0MB
-
MD5
e8364679ef8d194d9275a1047853e06d
-
SHA1
adfd97cd298b3c83673528290a9e3eb70a9c0b94
-
SHA256
cc7d6c04c61434029006adfb78c8e0d8bc82e2a86e1165d21f2063922e40f6ce
-
SHA512
34195f43648dbad08c087fce17b9970a4253aa831bac0e382fc7d51c6734d05773d04b0e1ad8ddd53a3626aa2eb253d0cb2c6bf0a9efaeba947c8295825dc029
-
SSDEEP
49152:LOZM7bCEd7Vx8VbLzSzwlpEdkcOPxz7Nr4hRETN0u:mwbCEd7v8l6fhM7NrZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc7d6c04c61434029006adfb78c8e0d8bc82e2a86e1165d21f2063922e40f6ce
Files
-
cc7d6c04c61434029006adfb78c8e0d8bc82e2a86e1165d21f2063922e40f6ce.exe windows:5 windows x86 arch:x86
1d5092ce86c671644ab1b13f3068fc57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
OutputDebugStringW
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
GetLocaleInfoW
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
RtlUnwind
ExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
GetACP
GetFileType
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetConsoleCtrlHandler
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetStdHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
LCMapStringW
CompareStringW
MultiByteToWideChar
EncodePointer
GetProcAddress
GetModuleHandleW
GetTickCount
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
QueryPerformanceCounter
WideCharToMultiByte
TryEnterCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetExitCodeThread
GetCurrentThreadId
GetCurrentThread
SwitchToThread
GetCurrentProcess
WaitForSingleObjectEx
DuplicateHandle
DeleteCriticalSection
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
SetFilePointer
GetFileSize
CreateFileW
CallNamedPipeW
DisconnectNamedPipe
WriteFile
ReadFile
ConnectNamedPipe
CreateNamedPipeW
MoveFileExW
GetModuleFileNameW
GetFullPathNameW
SetEvent
GetLastError
Sleep
CreateEventW
WaitForSingleObject
GetCurrentProcessId
CloseHandle
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
OpenProcess
SetEndOfFile
GetCurrentDirectoryW
ReadConsoleW
SetConsoleMode
ReadConsoleInputA
InterlockedPushEntrySList
TerminateProcess
GetFileSizeEx
GetExitCodeProcess
CreateProcessW
WTSGetActiveConsoleSessionId
GetDriveTypeW
SystemTimeToFileTime
GetSystemDirectoryW
FormatMessageA
InitializeCriticalSection
CreateFileA
GetFileAttributesA
SleepEx
VerSetConditionMask
VerifyVersionInfoW
ExpandEnvironmentStringsA
WaitForMultipleObjects
PeekNamedPipe
FlushConsoleInputBuffer
GetSystemTime
GlobalMemoryStatus
LoadLibraryA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileAttributesExW
advapi32
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenProcessToken
CryptAcquireContextW
ReportEventW
CryptEnumProvidersW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
OpenServiceW
QueryServiceConfigW
StartServiceW
ControlService
DeleteService
ChangeServiceConfig2W
OpenSCManagerW
CloseServiceHandle
QueryServiceStatus
CreateServiceW
RegisterEventSourceW
CryptSignHashW
CryptDestroyHash
DeregisterEventSource
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
CryptCreateHash
DuplicateTokenEx
CreateProcessAsUserW
SetTokenInformation
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
shlwapi
PathAddBackslashW
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
user32
MessageBoxW
GetUserObjectInformationW
GetProcessWindowStation
ws2_32
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
WSASetLastError
WSAStartup
__WSAFDIsSet
socket
WSAGetLastError
getaddrinfo
freeaddrinfo
accept
listen
recvfrom
sendto
ioctlsocket
getservbyname
gethostname
shutdown
htonl
select
gethostbyname
WSACleanup
wldap32
ord127
ord27
ord118
ord301
ord167
ord216
ord14
ord46
ord219
ord145
ord142
ord79
ord208
ord133
ord41
ord147
ord26
crypt32
CertEnumCertificatesInStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertCloseStore
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wtsapi32
WTSQueryUserToken
shell32
SHGetFolderPathW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 409KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 51KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 138KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE