secinit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3c8c0d2d474723005122beb39a6d644226cca8dac424cfef6a76f82f125eba3a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c8c0d2d474723005122beb39a6d644226cca8dac424cfef6a76f82f125eba3a.exe
Resource
win10v2004-20240802-en
General
-
Target
3c8c0d2d474723005122beb39a6d644226cca8dac424cfef6a76f82f125eba3a
-
Size
41KB
-
MD5
638d6db8f81ce54b1410308c4473355c
-
SHA1
5d4d1675749a3c776181b326e50ed9838e1f1a2a
-
SHA256
3c8c0d2d474723005122beb39a6d644226cca8dac424cfef6a76f82f125eba3a
-
SHA512
631ce5a3292f48228db7a23814b5914a8491a0d150076e357011045060f1daf3088f6bbe37adb87cba1b05628759cb162cc991bd920f4f46f2d4b47aac87e73e
-
SSDEEP
768:fgme9GwyIpR6GBzDQ4h2sdw9TkWvIN9rnGU4cc4e0AddX/fUAR1Rhf:fFe94UdBwDjZvqG6Fxs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c8c0d2d474723005122beb39a6d644226cca8dac424cfef6a76f82f125eba3a
Files
-
3c8c0d2d474723005122beb39a6d644226cca8dac424cfef6a76f82f125eba3a.exe windows:6 windows x86 arch:x86
b344298bb624a57b7145d7a26a66ca0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
QueryServiceStatus
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegUnLoadKeyW
RegLoadKeyW
RegQueryValueExW
kernel32
GetCurrentProcess
FreeLibrary
CloseHandle
LoadLibraryExW
GetLastError
WaitForSingleObject
OpenEventW
lstrlenW
GetTickCount
Sleep
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
UnhandledExceptionFilter
GetProcAddress
user32
CharUpperW
msvcrt
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
__setusermatherr
_amsg_exit
_stricmp
_initterm
exit
_XcptFilter
_exit
_cexit
__getmainargs
wcschr
srand
rand
memset
ntdll
RtlInitUnicodeString
NtOpenEvent
NtClose
NtCreateEvent
netapi32
NetJoinDomain
userenv
GetDefaultUserProfileDirectoryW
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE