oposhost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fd3899fc80dd70eb0c400e6f7c06b720N.exe
Resource
win10v2004-20240709-en
General
-
Target
fd3899fc80dd70eb0c400e6f7c06b720N.exe
-
Size
182KB
-
MD5
fd3899fc80dd70eb0c400e6f7c06b720
-
SHA1
0e2126ee335f3b6aa01c1b22e0db39460beb8094
-
SHA256
0eb116d65c3b652910e09f334f2502ecfa9fd877a087810751a000a087091639
-
SHA512
a25f827eec1f054004b97e9d27096c9d501f2ac5f65d7f2262f431b0a17f8d696e8e05468ef2ae94238dd5d0c7ba98757898363261d4682d35d8b39acf00499b
-
SSDEEP
3072:aTHE5vMMQgOi2FKRbSATm/HR1cYCmoIHihp23oIuXBJNoc99UckE1:a4vMMQgOg+H5ihp2UNGE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd3899fc80dd70eb0c400e6f7c06b720N.exe
Files
-
fd3899fc80dd70eb0c400e6f7c06b720N.exe.exe windows:10 windows x86 arch:x86
e5572fada1e7f918bbbaa808b26bb150
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcp_win
?_Xlength_error@std@@YAXPBD@Z
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_initterm
_register_thread_local_exe_atexit_callback
_c_exit
api-ms-win-crt-string-l1-1-0
memset
api-ms-win-crt-private-l1-1-0
_o___stdio_common_vsnprintf_s
_o___stdio_common_vswprintf
_o__callnewh
_o__cexit
_o__configthreadlocale
_o__configure_wide_argv
_o__controlfp_s
_o__crt_atexit
_o__errno
_o__exit
_o__get_initial_wide_environment
_o__initialize_onexit_table
_o__initialize_wide_environment
_o__invalid_parameter_noinfo
_o__invalid_parameter_noinfo_noreturn
_o__register_onexit_function
_o__seh_filter_exe
memmove
_o__set_app_type
_o__set_fmode
_o__set_new_mode
_o_exit
_o_free
_o_malloc
_o_realloc
_o_terminate
_o_toupper
_o_wcstoll
_except_handler4_common
_CxxThrowException
_o___std_exception_destroy
_o___std_exception_copy
_o___p__commode
_o___p___wargv
_o___p___argc
__CxxFrameHandler3
memcpy
api-ms-win-core-libraryloader-l1-2-0
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetModuleFileNameA
GetModuleHandleExW
api-ms-win-core-heap-l1-1-0
HeapAlloc
GetProcessHeap
HeapFree
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcess
GetCurrentThreadId
TerminateProcess
GetCurrentProcessId
api-ms-win-core-localization-l1-2-0
FormatMessageW
oleaut32
VariantChangeType
SysAllocStringByteLen
VariantInit
LoadTypeLi
VariantClear
DispGetIDsOfNames
SysStringByteLen
SysFreeString
api-ms-win-core-debug-l1-1-0
IsDebuggerPresent
OutputDebugStringW
DebugBreak
api-ms-win-eventing-classicprovider-l1-1-0
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
UnregisterTraceGuids
RegisterTraceGuidsW
TraceMessage
api-ms-win-core-synch-l1-1-0
ReleaseSRWLockExclusive
CreateEventW
InitializeCriticalSection
AcquireSRWLockExclusive
WaitForSingleObject
DeleteCriticalSection
SetEvent
api-ms-win-core-errorhandling-l1-1-0
GetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SetLastError
RaiseException
api-ms-win-core-com-l1-1-0
CoUninitialize
CoInitializeEx
CoCreateInstance
CLSIDFromProgID
api-ms-win-core-io-l1-1-1
CancelIo
api-ms-win-security-sddl-l1-1-0
ConvertStringSecurityDescriptorToSecurityDescriptorW
api-ms-win-core-namedpipe-l1-1-0
ConnectNamedPipe
CreateNamedPipeW
api-ms-win-core-file-l1-1-0
ReadFile
WriteFile
api-ms-win-core-io-l1-1-0
GetOverlappedResult
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-processthreads-l1-1-1
IsProcessorFeaturePresent
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
api-ms-win-core-interlocked-l1-1-0
InitializeSListHead
api-ms-win-rtcore-ntuser-synch-l1-1-0
MsgWaitForMultipleObjects
api-ms-win-rtcore-ntuser-window-l1-1-0
PeekMessageW
TranslateMessage
DispatchMessageW
api-ms-win-eventing-provider-l1-1-0
EventUnregister
EventWriteTransfer
EventSetInformation
EventProviderEnabled
EventRegister
api-ms-win-core-heap-l2-1-0
LocalAlloc
api-ms-win-core-synch-l1-2-0
Sleep
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ