C:\BUILD\work\3ec84b7238d5b18a\BUILDS\Release\x64\overseer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f01b02a08c1953e7db9ce61207b121c6efbe986181ba0df1ec205b5909bd856c.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
f01b02a08c1953e7db9ce61207b121c6efbe986181ba0df1ec205b5909bd856c.exe
Resource
win11-20240802-en
General
-
Target
f01b02a08c1953e7db9ce61207b121c6efbe986181ba0df1ec205b5909bd856c
-
Size
2.3MB
-
MD5
9fb83bee6ff97065c498f48fc094f848
-
SHA1
860112de5e833eb5fd9abaaf6db7c881c13220f8
-
SHA256
f01b02a08c1953e7db9ce61207b121c6efbe986181ba0df1ec205b5909bd856c
-
SHA512
103f87414802d1edd3d932626a370cd8b3e37666d541e7550257ffa5f5e6b0ce357f11dd14f13a5ff831d02da6a596d101682adf68855c1982093da03bdf8a96
-
SSDEEP
49152:YMLtHPldWW5afLAUCweyFI0ZBAFCGLcRe2xTIYLEs:j5aMUzRe2M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f01b02a08c1953e7db9ce61207b121c6efbe986181ba0df1ec205b5909bd856c
Files
-
f01b02a08c1953e7db9ce61207b121c6efbe986181ba0df1ec205b5909bd856c.exe windows:6 windows x64 arch:x64
6d8ae0d2e04c00f81a9b4bcd9a56d1d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
shell32
ShellExecuteExW
SHGetFolderPathW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
ntdll
RtlPcToFileHeader
NtDeleteKey
NtQueryKey
NtOpenKey
NtClose
RtlVirtualUnwind
RtlNtStatusToDosError
VerSetConditionMask
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlUnwind
kernel32
CreateProcessW
ReadFile
VerifyVersionInfoW
FileTimeToSystemTime
GetSystemTimeAsFileTime
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteFileW
GetFileInformationByHandle
GetFullPathNameW
OutputDebugStringA
TlsAlloc
TlsGetValue
TlsSetValue
FreeLibrary
CreateEventW
SetEvent
ResetEvent
CreateSemaphoreW
ReleaseSemaphore
GetSystemInfo
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
ExpandEnvironmentStringsW
GetModuleFileNameW
GetFileAttributesW
LoadLibraryExW
GetWindowsDirectoryW
GetSystemDirectoryW
VirtualAlloc
VirtualFree
GlobalMemoryStatusEx
GetExitCodeThread
TlsFree
GetDriveTypeW
SetFilePointer
K32GetProcessImageFileNameW
LockFileEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetFileAttributesExW
FindClose
CreateDirectoryW
GetCurrentDirectoryW
FindFirstFileExW
GetCurrentThread
QueryDosDeviceW
GetVolumePathNameW
GetVolumeNameForVolumeMountPointW
GetEnvironmentVariableW
GetDateFormatW
GetTimeFormatW
InitializeCriticalSectionAndSpinCount
GetVersion
LockResource
FindResourceExW
SetEnvironmentVariableW
UnlockFileEx
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
GetSystemTimes
RaiseException
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetSystemDirectoryA
GetModuleHandleA
LoadLibraryA
MoveFileExA
GetEnvironmentVariableA
SleepEx
CreateFileA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetVersionExA
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
IsProcessorFeaturePresent
InitOnceBeginInitialize
CompareStringW
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
InitializeProcThreadAttributeList
InitOnceComplete
FreeLibraryWhenCallbackReturns
SetFileAttributesW
GetFileSizeEx
SetFilePointerEx
WriteFile
SetEndOfFile
GetExitCodeProcess
WaitForSingleObject
FormatMessageW
GetModuleHandleExW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
HeapFree
GetCommandLineW
OpenMutexW
GetComputerNameW
GetLocaleInfoA
GetDiskFreeSpaceExW
GetNativeSystemInfo
GetVersionExW
SetLastError
ReleaseMutex
MultiByteToWideChar
OutputDebugStringW
GetCurrentProcessId
GetCurrentThreadId
DeviceIoControl
CopyFileW
MoveFileExW
FlushFileBuffers
CreateFileW
GetCurrentProcess
SetPriorityClass
HeapSetInformation
CreateMutexW
LocalFree
GetProcAddress
SetDllDirectoryW
GetSystemPowerStatus
QueryUnbiasedInterruptTime
SizeofResource
LoadResource
FindResourceW
GetModuleHandleW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GetProcessTimes
WideCharToMultiByte
TerminateProcess
CloseHandle
OpenProcess
GetLastError
Sleep
GetTickCount64
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetTimeZoneInformation
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FormatMessageA
FlsAlloc
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
SystemTimeToTzSpecificLocalTime
TryAcquireSRWLockExclusive
GetStringTypeW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
PeekNamedPipe
GetFileType
ExitProcess
GetStdHandle
FreeLibraryAndExitThread
ExitThread
CreateThread
InterlockedPushEntrySList
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeSListHead
IsDebuggerPresent
GetCPInfo
LCMapStringEx
EncodePointer
GetLocaleInfoEx
WaitForSingleObjectEx
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
FindNextFileW
SetFileInformationByHandle
user32
LoadStringW
RegisterClassExW
GetClassInfoExW
advapi32
ConvertStringSidToSidW
OpenServiceW
QueryServiceStatusEx
CloseServiceHandle
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
QueryServiceStatus
ControlService
StartServiceW
SystemFunction036
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegDeleteTreeW
RegDeleteKeyExW
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExW
OpenSCManagerW
FreeSid
EqualSid
LookupAccountSidW
AllocateAndInitializeSid
RevertToSelf
ImpersonateSelf
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenThreadToken
GetTokenInformation
OpenProcessToken
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
VariantClear
VariantInit
SysAllocString
SysFreeString
bcrypt
BCryptGenRandom
ws2_32
getsockopt
WSAResetEvent
send
getservbyname
recvfrom
gethostname
ioctlsocket
recv
getsockname
getpeername
connect
bind
htonl
WSAGetLastError
select
__WSAFDIsSet
WSAIoctl
setsockopt
socket
htons
closesocket
WSACleanup
WSAStartup
WSASetLastError
ntohs
ntohl
WSAWaitForMultipleEvents
WSACloseEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
crypt32
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertFindCertificateInStore
winhttp
WinHttpCrackUrl
iphlpapi
GetBestRoute2
GetUnicastIpAddressTable
FreeMibTable
GetAdaptersAddresses
shlwapi
PathMatchSpecW
Exports
Exports
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 525KB - Virtual size: 524KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ