PerfHost.pdb
Static task
static1
General
-
Target
27c3c71ae2668a94423a8b62935af9d9.zip
-
Size
293KB
-
MD5
e044110089bff8f8cfe10530e094a3fe
-
SHA1
fdd4eceaeda359f221e8b29f5d39befb13135ffc
-
SHA256
477a07c22512ade5f328fe8648e854f58fdb780ff2a3736f179610872b01aa20
-
SHA512
f6325820e769c89dc66e3b29fc36c9457d037da138b46d363ad29e523912fa73d60d9d31e838bbadd51fe16b264a685595cde472dcdc9ba1f7ce2286f82d9dad
-
SSDEEP
6144:PF1s4SOyI56OYkLOQCveuA76Qvt9ca842eRTfJX2CWR+oI6:d15kTkLid25thf92L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/94cc76263e89da07babac5fcd203e2e4d45a080a038138feaf516a0efc276bb0
Files
-
27c3c71ae2668a94423a8b62935af9d9.zip.zip
Password: infected
-
94cc76263e89da07babac5fcd203e2e4d45a080a038138feaf516a0efc276bb0.exe windows:10 windows x86 arch:x86
Password: infected
3b1494b15b4dae22812c269c29d3e478
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_wcsicmp
_exit
_amsg_exit
__p__commode
_vsnwprintf
exit
__wgetmainargs
_XcptFilter
memcpy
_cexit
__p__fmode
__setusermatherr
_initterm
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
_controlfp
memset
ntdll
NtClose
NtQueryInformationToken
RtlNtStatusToDosError
NtOpenThreadToken
EtwEventWrite
RtlAllocateHeap
RtlExpandEnvironmentStrings
EtwEventUnregister
EtwEventRegister
RtlReleaseSRWLockShared
RtlAcquireSRWLockShared
RtlReleaseSRWLockExclusive
RtlAcquireSRWLockExclusive
RtlFreeHeap
rpcrt4
RpcServerUseProtseqW
RpcRevertToSelf
RpcEpRegisterW
RpcServerInqBindings
RpcServerRegisterIfEx
RpcServerUnregisterIf
RpcBindingVectorFree
RpcEpUnregister
RpcStringFreeW
RpcStringBindingParseW
RpcBindingToStringBindingW
RpcBindingInqAuthClientW
RpcImpersonateClient
NdrServerCall2
api-ms-win-core-errorhandling-l1-1-0
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLastError
api-ms-win-core-heap-l1-1-0
HeapSetInformation
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleW
GetProcAddress
LoadLibraryExW
FreeLibrary
api-ms-win-core-registry-l1-1-0
RegOpenKeyExW
RegQueryValueExW
RegQueryValueExA
RegCloseKey
api-ms-win-core-processthreads-l1-1-0
GetCurrentThreadId
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-synch-l1-1-0
InitializeSRWLock
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-sysinfo-l1-1-0
GetTickCount
GetSystemTimeAsFileTime
api-ms-win-core-threadpool-l1-2-0
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
api-ms-win-service-core-l1-1-0
SetServiceStatus
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 988KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ