C:\assemblage\Builds\4723593949046173462cadiapvhkq\WaitingOn-master\assemblage_outdir_bin\WaitingOn.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a42b4a9b58789bf7a8865a89831ea21385bce851a1698d81a06a857698bbfc19.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a42b4a9b58789bf7a8865a89831ea21385bce851a1698d81a06a857698bbfc19.exe
Resource
win10v2004-20240802-en
General
-
Target
a42b4a9b58789bf7a8865a89831ea21385bce851a1698d81a06a857698bbfc19
-
Size
107KB
-
MD5
5eb1207c315dbc21966b458f9e484abe
-
SHA1
9ecd096758ce0af76b4170d841ada6c1cc24ef7f
-
SHA256
a42b4a9b58789bf7a8865a89831ea21385bce851a1698d81a06a857698bbfc19
-
SHA512
74ce104f51d39b0e5554a872afd7a0a56eeeaf3fd41cbf10025ecbe9164fb03addc6f7c87002101a6bfedf8c1b3d1f617a7ea98f28d8b1405bda9ac81d12ab66
-
SSDEEP
3072:g+Bkcc0vEgODoWNFWnVqlaZeei1lKxIwYUPYPnV:g6kccUOXNcqmYUPOnV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a42b4a9b58789bf7a8865a89831ea21385bce851a1698d81a06a857698bbfc19
Files
-
a42b4a9b58789bf7a8865a89831ea21385bce851a1698d81a06a857698bbfc19.exe windows:6 windows x86 arch:x86
64b575d93a91cd276a6d14967900b968
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
GetTokenInformation
CloseThreadWaitChainSession
EnumServicesStatusExW
OpenProcessToken
GetThreadWaitChain
OpenThreadWaitChainSession
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
kernel32
GetCurrentProcess
Thread32Next
Thread32First
LocalAlloc
K32GetProcessImageFileNameW
OpenProcess
CreateToolhelp32Snapshot
GetExitCodeThread
GetLastError
CloseHandle
K32EnumProcesses
LocalFree
GetCurrentProcessId
OpenThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetFileType
GetStringTypeW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
HeapReAlloc
SetFilePointerEx
WriteConsoleW
CreateFileW
DecodePointer
RaiseException
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ