U:\develop\global\Release\bin\common\WSCommCntr1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a923141d278449f980356404dc3fe940N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a923141d278449f980356404dc3fe940N.exe
Resource
win10v2004-20240802-en
General
-
Target
a923141d278449f980356404dc3fe940N.exe
-
Size
140KB
-
MD5
a923141d278449f980356404dc3fe940
-
SHA1
8148b631fdbb85019af2de183014cf26187dffd4
-
SHA256
e64fbfbcef3a537acb18d9e0148c55c6c56f9581cc7eda8e62cde76c0f34dc0a
-
SHA512
f1041400dcc97bd0ccbf46b5a7432b389ea57c72bea0e7e2b2cfad5df1bc58374332c756084bc88fb18178363398bb6a95708e40a5a03ee020514721bcfb1d46
-
SSDEEP
3072:A9j0584NYSOAaw4Qjn4BZlxH+Hg0IQNCF4BHBOrs1osiy7kOO:y7y1pahZltsdIQ511kOO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a923141d278449f980356404dc3fe940N.exe
Files
-
a923141d278449f980356404dc3fe940N.exe.exe windows:4 windows x86 arch:x86
14a4fe2f11823efe391ba9e2ba824c4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LeaveCriticalSection
LocalAlloc
FormatMessageW
GetFileAttributesW
CreateDirectoryW
OpenProcess
CloseHandle
LocalFree
DeleteFileW
SetEvent
CreateEventW
CreateThread
WaitForSingleObject
CreateWaitableTimerW
SetWaitableTimer
WaitForMultipleObjects
InterlockedDecrement
GetCurrentThreadId
GetModuleHandleW
RaiseException
GetCommandLineW
Sleep
GetLastError
GetVersionExA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetModuleFileNameW
CancelWaitableTimer
lstrlenW
TerminateProcess
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
user32
SetTimer
CharUpperBuffW
PostThreadMessageW
CharUpperW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
UnregisterClassA
advapi32
RegDeleteKeyW
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
shell32
SHGetFolderPathW
ole32
CLSIDFromString
CoDisconnectObject
CoCreateInstance
CoRegisterClassObject
CoInitializeEx
CoUninitialize
CoInitialize
CoRevokeClassObject
StringFromGUID2
oleaut32
UnRegisterTypeLi
RegisterTypeLi
VarBstrCat
VariantChangeType
SysAllocStringLen
VariantCopy
VariantClear
SafeArrayLock
SafeArrayCreate
SafeArrayRedim
VarBstrCmp
SafeArrayUnlock
SafeArrayDestroy
SafeArrayCopy
SafeArrayGetVartype
SafeArrayGetUBound
SafeArrayGetLBound
VariantInit
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysStringLen
SysAllocString
SysAllocStringByteLen
SysStringByteLen
msvcr80
__CxxFrameHandler3
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
__dllonexit
_encode_pointer
_CxxThrowException
??3@YAXPAX@Z
??_U@YAPAXI@Z
??_V@YAXPAX@Z
free
??2@YAPAXI@Z
_purecall
memcpy_s
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
_wtol
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
?what@exception@std@@UBEPBDXZ
memmove_s
swprintf_s
_swprintf
_recalloc
calloc
malloc
wcsstr
_wtoi
_resetstkoflw
_wtoi64
_localtime64
_time64
wcsftime
wcsncpy_s
wcscat_s
wcscpy_s
memset
?terminate@@YAXXZ
_unlock
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
Sections
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE