C:\dev\projs\processsupervisor\output\TweakScheduler.pdb
Static task
static1
Behavioral task
behavioral1
Sample
169d106c29c5c3a1ba7597ba0113914965524e850e4c9d32c7e84b3a04e27478.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
169d106c29c5c3a1ba7597ba0113914965524e850e4c9d32c7e84b3a04e27478.exe
Resource
win10v2004-20240802-en
General
-
Target
169d106c29c5c3a1ba7597ba0113914965524e850e4c9d32c7e84b3a04e27478
-
Size
577KB
-
MD5
4c1eb1c1dd2d5ae606d95b1f6b623b57
-
SHA1
cbe6d0437865d7af77b8b67645c0ef3888185a06
-
SHA256
169d106c29c5c3a1ba7597ba0113914965524e850e4c9d32c7e84b3a04e27478
-
SHA512
b39c9ae23dc6b176e09195e3da95947fdfaef520cbc65ea4efca2561580434f95e63677b22ffd2791fc979bb5bac672d232b1e513542e8375424f41d855853cf
-
SSDEEP
6144:xTXL60iqAFkUjgm+2r9tuDDqselrSRPjPNIxROCOZGDakpOuA3q2LCmCudsRWyN:TMnM26FelKPZI3PNOuA3qZRWyN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 169d106c29c5c3a1ba7597ba0113914965524e850e4c9d32c7e84b3a04e27478
Files
-
169d106c29c5c3a1ba7597ba0113914965524e850e4c9d32c7e84b3a04e27478.exe windows:6 windows x86 arch:x86
a5d36944278451d50f55e8c3e8404747
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
kernel32
GetActiveProcessorGroupCount
GetNumaHighestNodeNumber
OutputDebugStringW
GetVersionExW
GetCurrentProcess
GetExitCodeProcess
GetFileTime
GetSystemTimeAsFileTime
CloseHandle
MultiByteToWideChar
GetFileAttributesW
CreateFileW
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
ExitProcess
LoadLibraryW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
FindResourceExW
GetSystemInfo
HeapReAlloc
LockResource
GetLastError
HeapSize
InitializeCriticalSectionEx
GetLogicalProcessorInformationEx
HeapFree
IsBadWritePtr
SizeofResource
GetActiveProcessorCount
WriteConsoleW
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FreeLibrary
GetUserDefaultUILanguage
VerSetConditionMask
CreateDirectoryW
DeleteFileW
GetFileSize
GetLongPathNameW
GetShortPathNameW
RemoveDirectoryW
GetVolumeNameForVolumeMountPointW
SetLastError
OpenEventW
GetCurrentProcessId
CreateProcessW
GetStartupInfoW
ProcessIdToSessionId
OpenProcess
GetSystemDirectoryW
GetSystemWow64DirectoryW
GetModuleFileNameW
GetProcAddress
GlobalAlloc
GlobalUnlock
GlobalLock
LocalFree
WinExec
FormatMessageW
CopyFileW
MoveFileW
VerifyVersionInfoW
WideCharToMultiByte
ReadFile
GetHandleInformation
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
WaitForMultipleObjects
Sleep
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
RaiseException
TryAcquireSRWLockExclusive
QueryPerformanceFrequency
FormatMessageA
SetFileInformationByHandle
GetTempPathW
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetFileInformationByHandleEx
CreateSymbolicLinkW
GetLocaleInfoEx
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetCurrentThread
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetConsoleCtrlHandler
SetStdHandle
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
user32
FindWindowW
GetWindowThreadProcessId
GetIconInfo
GetSystemMetrics
UnregisterClassW
LoadStringW
MessageBoxW
GetDlgItem
OpenClipboard
CloseClipboard
SetWindowLongW
GetWindowLongW
SetClipboardData
EmptyClipboard
GetWindowTextW
InvalidateRect
GetDC
PostMessageW
EndDialog
SetWindowTextW
ShowWindow
wvsprintfW
ExitWindowsEx
SetDlgItemTextW
IsDlgButtonChecked
CheckDlgButton
DialogBoxParamW
EnableWindow
CreateWindowExW
SendMessageW
GetClientRect
ReleaseDC
advapi32
OpenProcessToken
QueryServiceStatus
ConvertStringSidToSidW
QueryServiceConfigW
OpenServiceW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
CreateProcessAsUserW
DuplicateTokenEx
GetLengthSid
GetSidSubAuthority
GetSidSubAuthorityCount
OpenSCManagerW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
RegSetValueExW
StartServiceW
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
SetTokenInformation
GetUserNameW
RegEnumKeyW
RegEnumValueW
ChangeServiceConfigW
CloseServiceHandle
ControlService
EnumServicesStatusExW
NotifyBootConfigStatus
shell32
SHGetKnownFolderPath
SHChangeNotify
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHGetStockIconInfo
ShellExecuteExW
ShellExecuteW
ole32
CLSIDFromString
CoTaskMemFree
oleaut32
SysAllocString
SysFreeString
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
InternetCanonicalizeUrlW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
shlwapi
SHDeleteKeyW
gdi32
GetTextExtentPoint32W
SelectObject
GetObjectW
DeleteObject
Sections
.text Size: 464KB - Virtual size: 464KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ