SCardSvr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fb06a32943b0326c7c551039a1c19173322c60f961fae738a2a0238402a397d9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb06a32943b0326c7c551039a1c19173322c60f961fae738a2a0238402a397d9.exe
Resource
win10v2004-20240802-en
General
-
Target
fb06a32943b0326c7c551039a1c19173322c60f961fae738a2a0238402a397d9
-
Size
77KB
-
MD5
4972edc933e4710cc9871d01f1cf6713
-
SHA1
5b224f38a8a0564153bd38b58aac61feb19e5c73
-
SHA256
fb06a32943b0326c7c551039a1c19173322c60f961fae738a2a0238402a397d9
-
SHA512
4b14677b3df50b312f5d23a5fa0c7e00ac620dfcbbd446f8938a0b3862f7d4cf64bb43b7e8279c9fd64a45b64af0dba524bf89420a4306297ae80e017c70cd6e
-
SSDEEP
1536:8RzqSJALa2fxM2wqaXv1dXZSgilsXNJcJ24JPXy/hQwo08XySEQbtmn:TPfxMqCv15ZFS4N62mU74ySEQbtmn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb06a32943b0326c7c551039a1c19173322c60f961fae738a2a0238402a397d9
Files
-
fb06a32943b0326c7c551039a1c19173322c60f961fae738a2a0238402a397d9.exe windows:5 windows x86 arch:x86
061fb9d97a7cdd48e616333e2c4cb31c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
printf
?set_terminate@@YAP6AXXZP6AXXZ@Z
_CxxThrowException
__CxxFrameHandler
puts
??2@YAPAXI@Z
__set_app_type
?terminate@@YAXXZ
_onexit
__dllonexit
_controlfp
??1type_info@@UAE@XZ
_except_handler3
??3@YAXPAX@Z
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
advapi32
GetTokenInformation
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
IsValidSid
GetAclInformation
AddAce
InitializeAcl
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
OpenProcessToken
OpenThreadToken
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceCtrlDispatcherA
RegCloseKey
ImpersonateNamedPipeClient
CheckTokenMembership
RegisterEventSourceA
ReportEventA
DeregisterEventSource
SetSecurityDescriptorDacl
AddAccessAllowedAce
GetAce
GetLengthSid
kernel32
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CreateEventA
WaitForSingleObject
lstrlenA
ResetEvent
SetEvent
GetCurrentThread
GetCurrentProcess
CloseHandle
HeapAlloc
GetLastError
GetProcessHeap
HeapFree
LeaveCriticalSection
EnterCriticalSection
ReadFile
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
ExpandEnvironmentStringsA
SetLastError
MultiByteToWideChar
GetACP
WideCharToMultiByte
lstrlenW
LocalFree
LocalAlloc
GetModuleHandleA
FormatMessageA
lstrcmpiA
OpenEventA
lstrcpyA
PulseEvent
ResumeThread
CreateThread
Sleep
DuplicateHandle
OpenProcess
WaitForMultipleObjects
GetOverlappedResult
DeviceIoControl
CancelWaitableTimer
SetWaitableTimer
CreateWaitableTimerA
SetThreadPriority
CreateFileA
DisconnectNamedPipe
CreateNamedPipeA
ConnectNamedPipe
WriteFile
GetSystemTimeAsFileTime
user32
RegisterDeviceNotificationA
LoadStringA
wsprintfA
UnregisterDeviceNotification
ntdll
isgraph
sprintf
_ultoa
strpbrk
_itoa
_strnicmp
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE