sppsvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fa670fa36344230b2bca41ad99e8c240N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
fa670fa36344230b2bca41ad99e8c240N.exe
Resource
win10v2004-20240709-en
General
-
Target
fa670fa36344230b2bca41ad99e8c240N.exe
-
Size
3.9MB
-
MD5
fa670fa36344230b2bca41ad99e8c240
-
SHA1
5da25c24f48892954b3480bb7e6cb5a27c8cbbc8
-
SHA256
7c9fa48142e7a95034819202784ec4341d1a1ea75820ed784634b7ae50abca09
-
SHA512
daa475628406d3b587464ffc038daf6b3b59e008cf5b4f9db3399b486d83b790956ecdbf3d4a24b2585c5182d38273960255ef5487c92478c10b54f56751ca2e
-
SSDEEP
49152:vadpFcx1nkQoqvUbvgXELEnAR0gXV/XB+7nZE1GhnuFnNeNMWo8CWgiV5omI05If:EFcxeecao3yudFnN0DHIe9Utq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa670fa36344230b2bca41ad99e8c240N.exe
Files
-
fa670fa36344230b2bca41ad99e8c240N.exe.exe windows:6 windows x64 arch:x64
7bcaa6f7c2a49f73d8165171f14f2bd5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
TraceMessage
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
ConvertStringSidToSidW
RegSetKeySecurity
RegCreateKeyExW
RegDeleteValueW
RegQueryInfoKeyW
RegEnumKeyW
RegSetValueExW
RegDeleteKeyW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
CryptGenRandom
CryptAcquireContextW
CryptReleaseContext
ConvertSidToStringSidW
OpenProcessToken
EqualSid
GetTokenInformation
RegEnumKeyExW
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptDestroyKey
CryptEncrypt
CryptDecrypt
CryptImportKey
CryptSignHashA
CryptVerifySignatureA
CryptExportKey
CryptGenKey
RegisterTraceGuidsA
LookupAccountNameW
kernel32
CreateEventW
RegisterWaitForSingleObject
CreateTimerQueue
CreateTimerQueueTimer
GetModuleHandleExW
UnregisterWaitEx
DeleteTimerQueue
DecodePointer
DeleteTimerQueueEx
EncodePointer
FileTimeToSystemTime
CreateMutexW
OpenMutexW
ReleaseMutex
GetTickCount
CreateSemaphoreW
GetDateFormatW
GetTimeFormatW
ExpandEnvironmentStringsW
MultiByteToWideChar
CreateFileW
GetFileSize
ReadFile
QueueUserWorkItem
GetCurrentProcessId
OpenProcess
WriteFile
GetFileAttributesW
SetFileAttributesW
ChangeTimerQueueTimer
CreateDirectoryW
GetFileSizeEx
GetSystemInfo
SystemTimeToFileTime
CompareFileTime
GetSystemTimeAsFileTime
lstrlenW
RaiseException
GetModuleHandleA
WaitForMultipleObjects
GetDevicePowerState
CreateSemaphoreA
GetPrivateProfileStringW
GetFullPathNameW
InitializeCriticalSection
GetVersion
VirtualAlloc
SetLastError
VirtualFree
GetLocalTime
DeleteFileW
FlushFileBuffers
CopyFileW
MoveFileExW
SetFilePointer
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetVersionExA
WideCharToMultiByte
GetComputerNameW
DeviceIoControl
LCMapStringW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
GetLocaleInfoW
GetSystemDirectoryW
UnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetProcAddress
LoadLibraryW
VirtualQuery
FreeLibrary
Sleep
GetVersionExW
WaitForSingleObject
SetEvent
ReleaseSemaphore
HeapSetInformation
LeaveCriticalSection
EnterCriticalSection
DeleteTimerQueueTimer
GetCurrentThreadId
LocalFree
DeleteCriticalSection
SetThreadPriority
GetThreadPriority
GetCurrentProcess
DuplicateHandle
GetCurrentThread
GetLastError
OpenThread
CloseHandle
LocalAlloc
GetProcessHeap
HeapFree
HeapAlloc
VirtualProtect
msvcrt
memmove
swscanf
_wcsicmp
wcschr
sscanf
_wtof
_wtoi
memcmp
_vsnwprintf
_itow
rand
srand
time
_vscwprintf
_beginthreadex
_ui64tow
malloc
free
?terminate@@YAXXZ
memset
memcpy
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__wgetmainargs
wcsncmp
_wcsnicmp
_purecall
rpcrt4
NdrServerCall2
RpcServerRegisterIfEx
RpcServerListen
RpcServerInqCallAttributesW
I_RpcBindingInqLocalClientPID
I_RpcMapWin32Status
RpcServerUnregisterIf
RpcMgmtStopServerListening
RpcRaiseException
RpcImpersonateClient
RpcRevertToSelfEx
UuidCreate
UuidFromStringW
RpcStringFreeW
UuidToStringW
RpcServerUseProtseqEpW
ntdll
NtQueryInformationThread
RtlEnterCriticalSection
RtlLeaveCriticalSection
RtlCopyUnicodeString
RtlCompareUnicodeString
RtlInitUnicodeString
RtlAllocateHeap
RtlFreeHeap
RtlDeleteFunctionTable
RtlInstallFunctionTableCallback
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
NtSetInformationThread
ole32
CoUninitialize
CoInitializeEx
CoInitializeSecurity
Exports
Exports
?SPRevision@@3PADA
?SPVersion@@3PADA
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE