C:\dvs\p4\build\sw\rel\gpu_drv\r352\r353_23\drivers\ui\nvvsvc\x64\ReleaseWin7\bin\nvvsvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6d534bb86219f57a2d79ffe4adea10c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6d534bb86219f57a2d79ffe4adea10c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6d534bb86219f57a2d79ffe4adea10c0N.exe
-
Size
1.4MB
-
MD5
6d534bb86219f57a2d79ffe4adea10c0
-
SHA1
e98c879567d8423975be8b0b8a709ff25981b32f
-
SHA256
b2d6a223cc63d53575b5d0ea3f93a3fea02de9f23bc4f7bc780aeb0c81f649ad
-
SHA512
301646e4ce605687867859f102d32346f6bcdc75484e0c7eb5441f311fa45a309bd09d8c4e6142b03aec6236e25b5192e6a67f2b61cf9bbe664f81a7b37cb666
-
SSDEEP
24576:FTYEq4qE1I954lAUCN1GZ0/Ii7fJ4yL/tNCJPXUQrPd:FZqI1LlVCNt/I6fJ4klKXnl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6d534bb86219f57a2d79ffe4adea10c0N.exe
Files
-
6d534bb86219f57a2d79ffe4adea10c0N.exe.exe windows:5 windows x64 arch:x64
1a5d30d573e38d98d94e23ec5c14789a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
wtsapi32
WTSQueryUserToken
shlwapi
SHSetValueW
PathAddBackslashW
StrStrIW
PathFindFileNameW
SHDeleteValueW
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
setupapi
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
SetupDiOpenDevRegKey
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
CM_Get_DevNode_Status
SetupDiGetDeviceInstanceIdW
kernel32
SetLastError
GetProcAddress
LocalAlloc
CloseHandle
LocalFree
WTSGetActiveConsoleSessionId
lstrcmpiW
CreateMutexW
FindResourceW
LoadResource
GetCurrentProcess
QueryPerformanceCounter
WaitForSingleObject
SetEvent
GetSystemTimeAsFileTime
WriteFile
GetProcessTimes
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
SizeofResource
CreateEventA
LeaveCriticalSection
CreateSemaphoreA
MultiByteToWideChar
lstrlenW
ReleaseSemaphore
RaiseException
GetFileSizeEx
EnterCriticalSection
GetLastError
WaitForMultipleObjects
Process32NextW
CreateToolhelp32Snapshot
QueryPerformanceFrequency
DeleteCriticalSection
GetCurrentThreadId
ReleaseMutex
ExpandEnvironmentStringsW
GetCommandLineW
InitializeCriticalSection
Sleep
TerminateProcess
CreateEventW
OpenEventW
GetTickCount
DuplicateHandle
CreateThread
DeviceIoControl
ResetEvent
GetLocaleInfoW
CreateFileW
GetModuleFileNameW
GetFileAttributesW
GetSystemDirectoryW
GetModuleHandleW
OutputDebugStringW
LoadLibraryExW
FreeLibrary
RemoveDirectoryW
DeleteFileW
CreateDirectoryW
MoveFileW
ReadFile
FormatMessageA
Process32FirstW
CreateWaitableTimerA
SetWaitableTimer
SystemTimeToFileTime
TlsSetValue
OpenEventA
TlsGetValue
TlsFree
TlsAlloc
GetProcessHeap
SetEnvironmentVariableA
CompareStringW
FlushFileBuffers
WriteConsoleW
SetStdHandle
LoadLibraryW
GetConsoleMode
GetConsoleCP
SetFilePointer
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
LoadLibraryA
HeapFree
HeapAlloc
GetDateFormatA
GetTimeFormatA
EncodePointer
DecodePointer
RtlPcToFileHeader
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
VirtualProtect
VirtualAlloc
SetThreadStackGuarantee
GetSystemInfo
VirtualQuery
GetCommandLineA
GetStartupInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
ExitProcess
GetStdHandle
GetTimeZoneInformation
RtlUnwindEx
HeapSize
LCMapStringW
HeapReAlloc
GetStringTypeW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetCurrentProcessId
advapi32
RegGetValueW
RegisterTraceGuidsW
ControlService
GetTraceEnableLevel
ConvertStringSecurityDescriptorToSecurityDescriptorW
UnregisterTraceGuids
SetServiceStatus
QueryServiceStatus
DuplicateTokenEx
GetTraceLoggerHandle
SetTokenInformation
GetTraceEnableFlags
RegisterServiceCtrlHandlerExW
OpenServiceW
StartServiceCtrlDispatcherW
OpenSCManagerW
DeleteService
OpenProcessToken
CloseServiceHandle
CreateServiceW
RegSetValueExW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegCreateKeyExW
TraceMessage
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
CreateProcessAsUserW
RegQueryValueExW
ole32
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
StringFromGUID2
CoRevokeClassObject
StringFromCLSID
CoTaskMemRealloc
CoInitializeSecurity
CoInitializeEx
CoRegisterClassObject
CoResumeClassObjects
CoCreateInstanceEx
CoAddRefServerProcess
oleaut32
VarUI4FromStr
Sections
.text Size: 597KB - Virtual size: 597KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE