PerfHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a79113aac9d7c76351a1d74e3d46cdac44146323496b85bb4150ae10f108453e.exe
Resource
win7-20240705-en
General
-
Target
f160b4aaad518b10dfc712bc54c37d11.zip
-
Size
293KB
-
MD5
00a7baaf0e0a1402a1251422cb9543a7
-
SHA1
480dc0c6a56853d1ffb86f484d07ba3e957e011f
-
SHA256
9b1b829a3fcd74fd5665f2149cf3765edac0de6830ec482711e068c21c6af79a
-
SHA512
84651da389a59b041bf7f8498f3437ff6510b7e79a2be6c1f8924900b39c766eb32e8cce112577e614b7202856442ed325124031ecf41c102f3ca9261ebe394a
-
SSDEEP
6144:uQoZ+nqE/+BK1d1oR+KJnCxF4qpDFPEv4ILTc4PhTE8nnHnveIc:thqEWQ1kxnCJDGvBTcuG8nHnNc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/a79113aac9d7c76351a1d74e3d46cdac44146323496b85bb4150ae10f108453e
Files
-
f160b4aaad518b10dfc712bc54c37d11.zip.zip
Password: infected
-
a79113aac9d7c76351a1d74e3d46cdac44146323496b85bb4150ae10f108453e.exe windows:6 windows x86 arch:x86
Password: infected
ec455612e80bfcf3ebcb2ba43aa8ce9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
memset
_vsnwprintf
memcpy
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_wcsicmp
_controlfp
_except_handler4_common
?terminate@@YAXXZ
ntdll
RtlReleaseSRWLockShared
RtlAcquireSRWLockShared
RtlReleaseSRWLockExclusive
RtlAcquireSRWLockExclusive
EtwEventUnregister
EtwEventRegister
RtlFreeHeap
RtlAllocateHeap
EtwEventWrite
RtlNtStatusToDosError
NtClose
NtQueryInformationToken
NtOpenThreadToken
RtlExpandEnvironmentStrings
rpcrt4
RpcBindingInqAuthClientW
RpcServerUnregisterIf
RpcBindingVectorFree
RpcEpUnregister
RpcBindingToStringBindingW
RpcServerInqBindings
RpcServerRegisterIfEx
RpcServerUseProtseqW
RpcRevertToSelf
RpcStringBindingParseW
RpcStringFreeW
RpcEpRegisterW
NdrServerCall2
RpcImpersonateClient
api-ms-win-core-errorhandling-l1-1-0
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
api-ms-win-core-heap-l1-1-0
HeapSetInformation
api-ms-win-core-interlocked-l1-1-0
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InterlockedCompareExchange
api-ms-win-core-libraryloader-l1-1-0
LoadLibraryExW
FreeLibrary
GetProcAddress
GetModuleHandleA
api-ms-win-core-localregistry-l1-1-0
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
api-ms-win-core-misc-l1-1-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-synch-l1-1-0
InitializeSRWLock
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-threadpool-l1-1-0
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolWork
api-ms-win-service-core-l1-1-0
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 988KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ