PerfHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e6e76e326d39cbe942d69f7d27cfa23355ddeb710a1ab7a29515cf0a001ce1b8.exe
Resource
win7-20240704-en
General
-
Target
37fc923f5c9d98bff902d465e93f84d0b1f1448648b5dd83c522b0a74c7bc608
-
Size
293KB
-
MD5
24b622f9f668a2f61332f25891d4e17e
-
SHA1
b8d38606a0011a1e7ce796de8d23dfd0ab6b2aed
-
SHA256
37fc923f5c9d98bff902d465e93f84d0b1f1448648b5dd83c522b0a74c7bc608
-
SHA512
9b261fbd00a41f4b0346cd556c8a0b8df95ff82829aec5c7a3d630996019533048c399e61319f569fd2b097da6228d41007ecaf6d2a77b66856668f8da430b97
-
SSDEEP
6144:wdxEz+qNvgQe9XhoBj/rRuDJ3as5mV0f+avRXzTUr:MY+4vheXIr9uD1m3mRjTi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/e6e76e326d39cbe942d69f7d27cfa23355ddeb710a1ab7a29515cf0a001ce1b8
Files
-
37fc923f5c9d98bff902d465e93f84d0b1f1448648b5dd83c522b0a74c7bc608.zip
Password: infected
-
e6e76e326d39cbe942d69f7d27cfa23355ddeb710a1ab7a29515cf0a001ce1b8.exe windows:6 windows x86 arch:x86
ec455612e80bfcf3ebcb2ba43aa8ce9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
memset
_vsnwprintf
memcpy
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_wcsicmp
_controlfp
_except_handler4_common
?terminate@@YAXXZ
ntdll
RtlReleaseSRWLockShared
RtlAcquireSRWLockShared
RtlReleaseSRWLockExclusive
RtlAcquireSRWLockExclusive
EtwEventUnregister
EtwEventRegister
RtlFreeHeap
RtlAllocateHeap
EtwEventWrite
RtlNtStatusToDosError
NtClose
NtQueryInformationToken
NtOpenThreadToken
RtlExpandEnvironmentStrings
rpcrt4
RpcBindingInqAuthClientW
RpcServerUnregisterIf
RpcBindingVectorFree
RpcEpUnregister
RpcBindingToStringBindingW
RpcServerInqBindings
RpcServerRegisterIfEx
RpcServerUseProtseqW
RpcRevertToSelf
RpcStringBindingParseW
RpcStringFreeW
RpcEpRegisterW
NdrServerCall2
RpcImpersonateClient
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
api-ms-win-core-heap-l1-1-0
HeapSetInformation
api-ms-win-core-interlocked-l1-1-0
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InterlockedCompareExchange
api-ms-win-core-libraryloader-l1-1-0
LoadLibraryExW
FreeLibrary
GetProcAddress
GetModuleHandleA
api-ms-win-core-localregistry-l1-1-0
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
api-ms-win-core-misc-l1-1-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-synch-l1-1-0
InitializeSRWLock
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-threadpool-l1-1-0
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolWork
api-ms-win-service-core-l1-1-0
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 988KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ