PresentationHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bf9d320a5f808b207448ba84c34883061095b8589d173040c00f2e5152d20438.exe
Resource
win10v2004-20240802-en
General
-
Target
b885623ee01af73fd7176a8056fa35dd.bin
-
Size
570KB
-
MD5
952f944c5bdb1f5ef5d1155640373861
-
SHA1
f2c41d172385abcc8ae50f9f901bc150be6de6dd
-
SHA256
ce7443120713d85061cbacc081ef07311339aead0e91280607811679c996a3e3
-
SHA512
878be119732cc146b43a1f9b7d968186e84fffc24dcd391d9184cfc60f3946576895182420fb454ef065aad9ab5d4e13b38ebd6c2b139cf7ad613bf5854d9be1
-
SSDEEP
12288:7k9mgrpGgzXwnGs/5F2IUL9D9Cm1xKF7m/k9Fs/aC/1lRFd6TG2D/U:4mgrpGgzAGs/zu9CmSF7m/k9m/h8ng
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bf9d320a5f808b207448ba84c34883061095b8589d173040c00f2e5152d20438.exe
Files
-
b885623ee01af73fd7176a8056fa35dd.bin.zip
Password: infected
-
bf9d320a5f808b207448ba84c34883061095b8589d173040c00f2e5152d20438.exe.exe windows:10 windows x86 arch:x86
Password: infected
b2ae8ce4d2c814b2a3d6ad65a56b0477
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_exit
_amsg_exit
_wcsicmp
__p__commode
_XcptFilter
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
wcsncpy_s
malloc
memcpy_s
wcscpy_s
??0exception@@QAE@ABQBDH@Z
wcscat_s
??0exception@@QAE@ABQBD@Z
exit
memcpy
_cexit
__p__fmode
_CxxThrowException
_controlfp
realloc
_errno
_except_handler4_common
_callnewh
memmove_s
isdigit
tolower
_purecall
??1type_info@@UAE@XZ
_onexit
free
__set_app_type
__getmainargs
memmove
_vsnwprintf
iswdigit
_wcsnicmp
__CxxFrameHandler3
__dllonexit
_unlock
_lock
?terminate@@YAXXZ
_acmdln
_initterm
__setusermatherr
_ismbblead
wcsncmp
memset
oleaut32
SysFreeString
VarUI4FromStr
SysAllocStringLen
kernel32
SetLastError
GetSystemDefaultUILanguage
GetLocaleInfoEx
GetUserDefaultUILanguage
GetLocaleInfoW
UnmapViewOfFile
LCIDToLocaleName
CreateFileMappingW
OpenEventW
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
MapViewOfFile
QueryPerformanceCounter
FreeLibrary
OutputDebugStringA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FindFirstFileW
FindClose
GetLastError
GetTempPathW
GetTempFileNameW
CreateFileW
WriteFile
GetVersionExW
GetNativeSystemInfo
CloseHandle
GetEnvironmentVariableW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CreateEventW
ResetEvent
SetEvent
Sleep
GetFileAttributesExW
FileTimeToSystemTime
HeapDestroy
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
ExitProcess
HeapReAlloc
HeapSize
GetCurrentProcess
GetStartupInfoW
GetCommandLineW
GetModuleFileNameW
LocalAlloc
OpenProcess
CreateTimerQueueTimer
TerminateProcess
ExpandEnvironmentStringsW
IsWow64Process
OutputDebugStringW
DeactivateActCtx
ActivateActCtx
CreateActCtxW
ReleaseActCtx
FormatMessageW
LocalFree
SwitchToThread
LoadLibraryW
SearchPathW
IsDebuggerPresent
GetCurrentProcessId
HeapSetInformation
InitializeCriticalSection
GetProcAddress
LoadLibraryExW
GetModuleHandleW
DeleteCriticalSection
FindResourceExW
lstrcmpiW
LoadResource
SizeofResource
RaiseException
advapi32
RegDeleteValueW
GetSidSubAuthorityCount
GetSidSubAuthority
RegEnumValueW
RegEnumKeyW
TraceEvent
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
RegCreateKeyExW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
AddAce
GetAce
AddAccessAllowedAce
InitializeAcl
GetLengthSid
GetAclInformation
SetTokenInformation
GetSecurityDescriptorDacl
GetKernelObjectSecurity
CopySid
LsaClose
LsaNtStatusToWinError
LsaLookupPrivilegeValue
LsaOpenPolicy
CreateWellKnownSid
EqualSid
CreateProcessAsUserW
CreateRestrictedToken
GetTokenInformation
OpenProcessToken
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
shell32
ShellExecuteW
SHGetFolderPathW
SHGetKnownFolderPath
ShellExecuteExW
CommandLineToArgvW
ole32
CreateBindCtx
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
StringFromGUID2
CoUninitialize
CoInitialize
CLSIDFromProgID
CoMarshalInterThreadInterfaceInStream
CoReleaseMarshalData
user32
LoadStringW
MsgWaitForMultipleObjects
PeekMessageW
DispatchMessageW
PostQuitMessage
TranslateMessage
GetMessageW
MessageBoxW
CharNextW
WaitForInputIdle
UnregisterClassA
MessageBeep
PostMessageW
shlwapi
AssocQueryStringW
PathFindExtensionW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
ntdll
RtlInitUnicodeString
api-ms-win-core-path-l1-1-0
PathCchAppend
mscoree
CoEEShutDownCOM
LoadLibraryShim
wininet
InternetCreateUrlW
InternetCrackUrlW
urlmon
URLDownloadToCacheFileW
CreateURLMonikerEx
GetClassFileOrMime
RegisterBindStatusCallback
CoInternetCreateSecurityManager
CoInternetCombineUrl
CoInternetParseUrl
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ