svchost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ce8b95eac8b139c6196460a47ea417f15de63fe1eee12aebc6e4d84441459b14.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce8b95eac8b139c6196460a47ea417f15de63fe1eee12aebc6e4d84441459b14.exe
Resource
win10v2004-20240802-en
General
-
Target
ce8b95eac8b139c6196460a47ea417f15de63fe1eee12aebc6e4d84441459b14
-
Size
41KB
-
MD5
e70e67828d715c43374bd56a1a4cce5f
-
SHA1
3dd7ed9c9ee17a6eedac61c34e666a2c6ba50b7d
-
SHA256
ce8b95eac8b139c6196460a47ea417f15de63fe1eee12aebc6e4d84441459b14
-
SHA512
623193e635f0528098e363c9cb0416305162e1a69de961783d19693e475704c49b81e4ed03752bb2ea609c01ccad2c9cfb4dcbfe7ba61275d4776b81c7010919
-
SSDEEP
768:ncG6xlCRaJKGOA7SHJM8JO8jNp4CFBgTZORA8l+l056mtvOtTIA2l0E73:ncG6yPzKSHJMsA2gTciq6mtv4IJl0k3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce8b95eac8b139c6196460a47ea417f15de63fe1eee12aebc6e4d84441459b14
Files
-
ce8b95eac8b139c6196460a47ea417f15de63fe1eee12aebc6e4d84441459b14.exe windows:5 windows x86 arch:x86
7a06bdb902da41a74668875a6c42864b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
SetSecurityDescriptorDacl
SetEntriesInAclW
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
OpenThreadToken
SetServiceStatus
RegisterServiceCtrlHandlerW
RegCloseKey
RegOpenKeyExW
StartServiceCtrlDispatcherW
kernel32
HeapFree
GetLastError
WideCharToMultiByte
lstrlenW
LocalFree
GetCurrentProcess
GetCurrentThread
GetProcAddress
LoadLibraryExW
LeaveCriticalSection
HeapAlloc
EnterCriticalSection
LCMapStringW
FreeLibrary
lstrcpyW
ExpandEnvironmentStringsW
lstrcmpiW
ExitProcess
GetCommandLineW
InitializeCriticalSection
GetProcessHeap
SetErrorMode
SetUnhandledExceptionFilter
RegisterWaitForSingleObject
InterlockedCompareExchange
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
LocalAlloc
lstrcmpW
DelayLoadFailureHook
ntdll
NtQuerySecurityObject
RtlFreeHeap
NtOpenKey
wcscat
wcscpy
RtlAllocateHeap
RtlCompareUnicodeString
RtlInitUnicodeString
RtlInitializeSid
RtlLengthRequiredSid
RtlSubAuthoritySid
NtClose
RtlSubAuthorityCountSid
RtlGetDaclSecurityDescriptor
RtlQueryInformationAcl
RtlGetAce
RtlImageNtHeader
wcslen
RtlUnhandledExceptionFilter
RtlCopySid
rpcrt4
RpcServerUnregisterIfEx
RpcMgmtWaitServerListen
RpcMgmtSetServerStackSize
RpcServerUnregisterIf
RpcServerListen
RpcServerUseProtseqEpW
RpcServerRegisterIf
I_RpcMapWin32Status
RpcMgmtStopServerListening
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uolesnj Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE