WPDShextAutoplay.pdb
Static task
static1
General
-
Target
757c726ff1c5e188b5393f9956eb6352c00504469383e2262ae4b32b737caea5
-
Size
597KB
-
MD5
c402d21c3485d4e880aa302b8b650ffa
-
SHA1
f37321f6e1bee10bb8aabf211d04f023f2b0a37a
-
SHA256
757c726ff1c5e188b5393f9956eb6352c00504469383e2262ae4b32b737caea5
-
SHA512
b055d2e38bf284e37489d28a6148a268b706ce3f68ad1742f6d11f10c50b28c83fff2cdbaafd76efb2b5ce234bdd4c41bbf7a338d730a8cd1dd9cfe6ce7454a3
-
SSDEEP
12288:oBaqzPTY53of4XgbXZqHfdQCaIY//RnhOWrZVoexdqCLH31Ii3Dn:oPYPwbXZq6C7Y/5kWrZVoe/1LH3bDn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 757c726ff1c5e188b5393f9956eb6352c00504469383e2262ae4b32b737caea5
Files
-
757c726ff1c5e188b5393f9956eb6352c00504469383e2262ae4b32b737caea5.exe windows:10 windows x64 arch:x64
d6e136d4a9e27f31c5602b427d3226e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
TraceMessage
kernel32
SetEvent
GetVersion
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetLastError
CompareStringW
CreateProcessW
SizeofResource
LockResource
LoadResource
FindResourceExW
CreateEventW
WaitForSingleObject
HeapReAlloc
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
Sleep
LeaveCriticalSection
EnterCriticalSection
RaiseException
DeleteCriticalSection
InitializeCriticalSection
HeapDestroy
GetProcessHeap
HeapAlloc
HeapFree
HeapSize
user32
SendMessageW
FindWindowW
UnregisterClassA
msvcrt
_vsnwprintf
__CxxFrameHandler3
_wcsicmp
memcpy_s
?terminate@@YAXXZ
_lock
_CxxThrowException
_onexit
__dllonexit
_unlock
??1type_info@@UEAA@XZ
_commode
_fmode
_acmdln
_initterm
__setusermatherr
_ismbblead
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
__C_specific_handler
_callnewh
malloc
free
wcstok
wcschr
_vscwprintf
vswprintf_s
memmove_s
memset
ntdll
RtlCaptureContext
RtlVirtualUnwind
RtlLookupFunctionEntry
oleaut32
SysFreeString
SysAllocString
shlwapi
StrRStrIW
ole32
CLSIDFromString
CoRegisterClassObject
CoRevokeClassObject
CoUninitialize
CoCreateInstance
CoInitializeEx
CreateBindCtx
setupapi
SetupDiGetDeviceInterfaceDetailW
SetupDiEnumDeviceInterfaces
SetupDiOpenDevRegKey
SetupDiGetDeviceInterfaceAlias
SetupDiGetClassDevsExW
SetupDiDestroyDeviceInfoList
SetupDiOpenDeviceInterfaceW
shell32
ord155
ShellExecuteExW
SHParseDisplayName
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 948B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE