iisrstas.pdb
Static task
static1
Behavioral task
behavioral1
Sample
be6b57eeadcccdd96b4af1c537eb19b0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be6b57eeadcccdd96b4af1c537eb19b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
be6b57eeadcccdd96b4af1c537eb19b0N.exe
-
Size
57KB
-
MD5
be6b57eeadcccdd96b4af1c537eb19b0
-
SHA1
5c2e549f9802c30876a01ca2a84c90f38be059f4
-
SHA256
bbedc0442895038ce04ea94f85867192cf44f414252be5d27f046b61ac8d245f
-
SHA512
d75bbadcce1a9f12f832e36584cff7fb9e0645b7d1b4e6c28ec2c7106a6b4d03ff3d3ffa7acb88175d346408603db70b7a656641017cf4e000f1bab3e986f835
-
SSDEEP
768:5QFhTuDJoobL7GlptplUKQY1tyHj195bJQjK:6uDJVi5UKbP+95bJQG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be6b57eeadcccdd96b4af1c537eb19b0N.exe
Files
-
be6b57eeadcccdd96b4af1c537eb19b0N.exe.exe windows:6 windows x86 arch:x86
c5cffe94de00235f0902026ac99b765d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegCloseKey
RegSetValueExW
RegOpenKeyExW
MakeSelfRelativeSD
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegQueryValueExW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
DeregisterEventSource
ReportEventW
RegisterEventSourceW
ControlService
EnumDependentServicesW
QueryServiceStatus
LookupPrivilegeValueW
AdjustTokenPrivileges
QueryServiceConfig2W
QueryServiceStatusEx
ChangeServiceConfig2W
StartServiceW
QueryServiceConfigW
kernel32
GetModuleHandleW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
lstrcmpiW
GetCurrentThreadId
GetCommandLineW
ReadProcessMemory
CompareStringOrdinal
OpenProcess
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
InterlockedDecrement
LocalFree
SetEvent
CloseHandle
WaitForSingleObject
GetLastError
GetSystemWindowsDirectoryW
CreateEventW
CreateThread
GetCurrentProcess
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
lstrlenW
Sleep
user32
DispatchMessageW
CharNextW
PostThreadMessageW
GetMessageW
msvcrt
_cexit
??_V@YAXPAX@Z
??_U@YAPAXI@Z
??3@YAXPAX@Z
_controlfp
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
__getmainargs
memcpy
??2@YAPAXI@Z
_purecall
wcscpy_s
_wcsicmp
memset
_strcmpi
free
_wtol
iswctype
malloc
swprintf_s
sprintf_s
atl
ord30
ord21
ord23
ord17
ord20
ord32
ord58
ord16
ole32
CoInitializeSecurity
CoInitializeEx
CoUninitialize
oleaut32
LoadRegTypeLi
SysStringLen
SysFreeString
iisutil
SetExplicitAccessSettings
AllocateAndCreateWellKnownSid
??0BUFFER@@QAE@I@Z
?ReallocStorage@BUFFER@@AAEHI@Z
?FreeMemory@BUFFER@@QAEXXZ
FreeWellKnownSid
PuDbgPrintError
ntdll
NtQueryInformationProcess
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE