PerfHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c95b33c8f04267b719df3d1206dc2e7ec00f35cf5d26ff1b71a62fca8033cc2c.exe
Resource
win7-20240729-en
General
-
Target
7f933f4e7451e1aa0c8b9c38c43a81c9.zip
-
Size
293KB
-
MD5
872ff47bcc75977bfc78161f01b675f5
-
SHA1
10260c07301ee32cbf51ae41241ab46dd967ffe1
-
SHA256
282d2a424083b7d21a870abf739d37eb99ecd04da017c199f62e1cbf5dbe0778
-
SHA512
cbae9b8b7143aea6d7f611e0aa92fc653a37c701c352b7ae376dc0ead3957c9ff723321f4d2d6d583336d7645aab9b37c0056eb52119d146b5d8d039812c0b1b
-
SSDEEP
6144:nKsD22hOwwvT65UdzA52lZ+Q54hl7B53TPVjkeguTlECWXyxqoVjomls:nKTMOg5UJAATmThhguTlRwObVzls
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/c95b33c8f04267b719df3d1206dc2e7ec00f35cf5d26ff1b71a62fca8033cc2c
Files
-
7f933f4e7451e1aa0c8b9c38c43a81c9.zip.zip
Password: infected
-
c95b33c8f04267b719df3d1206dc2e7ec00f35cf5d26ff1b71a62fca8033cc2c.exe windows:6 windows x86 arch:x86
Password: infected
ec455612e80bfcf3ebcb2ba43aa8ce9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
memset
_vsnwprintf
memcpy
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_wcsicmp
_controlfp
_except_handler4_common
?terminate@@YAXXZ
ntdll
RtlReleaseSRWLockShared
RtlAcquireSRWLockShared
RtlReleaseSRWLockExclusive
RtlAcquireSRWLockExclusive
EtwEventUnregister
EtwEventRegister
RtlFreeHeap
RtlAllocateHeap
EtwEventWrite
RtlNtStatusToDosError
NtClose
NtQueryInformationToken
NtOpenThreadToken
RtlExpandEnvironmentStrings
rpcrt4
RpcBindingInqAuthClientW
RpcServerUnregisterIf
RpcBindingVectorFree
RpcEpUnregister
RpcBindingToStringBindingW
RpcServerInqBindings
RpcServerRegisterIfEx
RpcServerUseProtseqW
RpcRevertToSelf
RpcStringBindingParseW
RpcStringFreeW
RpcEpRegisterW
NdrServerCall2
RpcImpersonateClient
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
api-ms-win-core-heap-l1-1-0
HeapSetInformation
api-ms-win-core-interlocked-l1-1-0
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InterlockedCompareExchange
api-ms-win-core-libraryloader-l1-1-0
LoadLibraryExW
FreeLibrary
GetProcAddress
GetModuleHandleA
api-ms-win-core-localregistry-l1-1-0
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
api-ms-win-core-misc-l1-1-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-synch-l1-1-0
InitializeSRWLock
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-threadpool-l1-1-0
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolWork
api-ms-win-service-core-l1-1-0
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 988KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ