WsTraceUtil.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5d5e2ccbcaa1ddad367f6127c38f1d90N.exe
Resource
win10v2004-20240730-en
General
-
Target
5d5e2ccbcaa1ddad367f6127c38f1d90N.exe
-
Size
1.6MB
-
MD5
5d5e2ccbcaa1ddad367f6127c38f1d90
-
SHA1
4ace0152ee2d4194152c380629c8113ca4c7c871
-
SHA256
dbe9271de4958b4e2cb4c81492df09d0ff138d41b56d24cf0cf76de222c2f6db
-
SHA512
a6ef7e7c6cafc2241d26c962100024c6e72f597e4783a36c42a8f7cde684385b3ad08ace954676f5b819f36aabaae17e70ada0dde56d6a94f431bb00589706de
-
SSDEEP
12288:k2fFFx7d0NxksRpWE9FRHSfNm1wgbIxnBw7dzE+e3gxZC6LgjigDy5fdv8fWi+:kWXCks7WE9F5pwg8zmdqQjC60jiHkU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d5e2ccbcaa1ddad367f6127c38f1d90N.exe
Files
-
5d5e2ccbcaa1ddad367f6127c38f1d90N.exe.exe windows:10 windows x64 arch:x64
d58e380036b627d7facf45be65458415
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
ConvertDefaultLocale
GetLocaleInfoW
GetUserDefaultUILanguage
GetConsoleOutputCP
CreateProcessW
GetVersionExW
CloseHandle
GetLastError
HeapSetInformation
GetProcAddress
WaitForSingleObject
FormatMessageW
LoadLibraryExW
GetStdHandle
GetEnvironmentVariableW
FileTimeToLocalFileTime
FindClose
FindFirstFileW
GetDriveTypeW
FileTimeToSystemTime
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
DecodePointer
SetLastError
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
WriteFile
GetModuleFileNameA
HeapCreate
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTickCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCommandLineW
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
RtlUnwindEx
HeapAlloc
HeapFree
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryA
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
Sleep
SetFilePointer
MultiByteToWideChar
CreateFileW
LCMapStringW
GetTimeZoneInformation
GetCurrentDirectoryW
WriteConsoleW
GetStringTypeW
HeapReAlloc
SetEndOfFile
GetProcessHeap
ReadFile
ReadConsoleW
GetDriveTypeA
SetThreadStackGuarantee
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
HeapSize
SetEnvironmentVariableA
CompareStringW
user32
LoadStringW
advapi32
ProcessTrace
OpenTraceW
CloseTrace
rpcrt4
RpcStringFreeW
UuidToStringW
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE