D:\2023--------RemotePC--ProductionCodes\rpcproxylatencycheck-multi\Release\RPCProxyLatency.pdb
Static task
static1
Behavioral task
behavioral1
Sample
19d9c09db0c98d4073301aad9eba1d787a0f6ca3cf92848b5c044f3656f85a7a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
19d9c09db0c98d4073301aad9eba1d787a0f6ca3cf92848b5c044f3656f85a7a.exe
Resource
win10v2004-20240730-en
General
-
Target
19d9c09db0c98d4073301aad9eba1d787a0f6ca3cf92848b5c044f3656f85a7a
-
Size
343KB
-
MD5
bed4ef5951769e4e485f11be4f8445dc
-
SHA1
d9071052ece88c291834c305889c1fee4be422f6
-
SHA256
19d9c09db0c98d4073301aad9eba1d787a0f6ca3cf92848b5c044f3656f85a7a
-
SHA512
467a5010f99f12c9248ee148166f28b0553da496edab2a417f78e334ff7e1e78e03940b8bf78d4d4d5b0866959ef629fb2c76552604640d5131567dd4f9ea2a3
-
SSDEEP
6144:qOzPAAqSjg9NAHkS7qKkR+/aZ3NL0k8rWP0EQkz:qOQSwNIj7qrR+/aZdLoWPckz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19d9c09db0c98d4073301aad9eba1d787a0f6ca3cf92848b5c044f3656f85a7a
Files
-
19d9c09db0c98d4073301aad9eba1d787a0f6ca3cf92848b5c044f3656f85a7a.exe windows:6 windows x86 arch:x86
f5f4db31a56b2b0a93a4efaea739cc60
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
HttpSendRequestA
InternetQueryOptionA
InternetOpenA
HttpOpenRequestA
InternetSetOptionA
InternetConnectA
kernel32
SetStdHandle
ReadConsoleW
LoadLibraryW
OutputDebugStringW
HeapReAlloc
EnumSystemLocalesEx
GetPrivateProfileStringA
GetLastError
SetErrorMode
SetUnhandledExceptionFilter
GetModuleFileNameA
CreateMutexA
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
WaitForMultipleObjects
CreateEventA
SetPriorityClass
GetCurrentProcess
CreateThread
WritePrivateProfileStringA
GetVersionExA
WriteConsoleW
SetFilePointer
WriteFile
CloseHandle
SetConsoleCtrlHandler
SetThreadAffinityMask
GetCurrentThread
QueryPerformanceFrequency
QueryPerformanceCounter
IsValidLocaleName
LCMapStringEx
GetUserDefaultLocaleName
CompareStringEx
GetDateFormatEx
GetTimeFormatEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount64
FlushFileBuffers
SetFilePointerEx
ReadFile
GetConsoleMode
GetConsoleCP
InitOnceExecuteOnce
SetEndOfFile
CreateFileW
CreateFileA
InterlockedIncrement
GetFileType
GetTimeZoneInformation
GetProcessHeap
GetModuleFileNameW
GetStdHandle
GetModuleHandleW
GetStartupInfoW
TerminateProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
UnhandledExceptionFilter
GetCurrentThreadId
SetLastError
GetOEMCP
SetEnvironmentVariableA
InterlockedDecrement
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
InterlockedExchange
EncodePointer
DecodePointer
GetLocaleInfoEx
MultiByteToWideChar
GetStringTypeW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
GetSystemTimeAsFileTime
GetLocalTime
GetCommandLineA
RaiseException
RtlUnwind
InitializeCriticalSectionAndSpinCount
HeapAlloc
GetCPInfo
LoadLibraryExW
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
IsValidCodePage
GetACP
user32
DefWindowProcA
DialogBoxParamA
DestroyWindow
BeginPaint
EndPaint
EndDialog
RegisterClassA
LoadStringA
PostQuitMessage
LoadIconA
LoadCursorA
gdi32
GetStockObject
advapi32
CreateProcessAsUserA
ws2_32
inet_ntoa
inet_addr
WSAStartup
WSACleanup
send
recv
getaddrinfo
WSAGetLastError
closesocket
freeaddrinfo
socket
ioctlsocket
connect
getnameinfo
shutdown
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ