disktoast.pdb
Static task
static1
Behavioral task
behavioral1
Sample
199361b8a3ca274c78687df4dba9aa137ff090c06766664d86e79d223f9326dc.exe
Resource
win10v2004-20240802-en
General
-
Target
4a12ec8c95ca415091d0deba46cebe81.zip
-
Size
284KB
-
MD5
32a47ecd5a2f854ed2f27c847d88675b
-
SHA1
16c065e4cc3a9ac5fd3806f28936387057bb9408
-
SHA256
f2c1f36ce97c0a6a5ed2eaea364cb638c3e505706c0e708e5947f82ba1be9a62
-
SHA512
12c5931462795c757238c466e9cc21ac9b89618829d7c178577ab8ac410e2e43ec0220e593371384ee67bb34b7eb2deb4d0cea87d028ec4f5d4746a92b9f1501
-
SSDEEP
6144:gN/owzB7c4jdnlbhYaKYrXVeo51Njh4+Kcc3BLB5ue6nGMRNx:YowV7cWlzE0iBt516npNx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/199361b8a3ca274c78687df4dba9aa137ff090c06766664d86e79d223f9326dc
Files
-
4a12ec8c95ca415091d0deba46cebe81.zip.zip
Password: infected
-
199361b8a3ca274c78687df4dba9aa137ff090c06766664d86e79d223f9326dc.exe windows:10 windows x64 arch:x64
Password: infected
83665e66a39d760c9186ff74babfccf1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
LoadStringW
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_c_exit
_initterm
_initterm_e
api-ms-win-crt-private-l1-1-0
_o__callnewh
_o__cexit
_o__configthreadlocale
_o__configure_wide_argv
_o__crt_atexit
_o__errno
_o__exit
_o__get_initial_wide_environment
_o__initialize_onexit_table
_o__initialize_wide_environment
_o__invalid_parameter_noinfo
_o__purecall
_o__register_onexit_function
_o__seh_filter_exe
_o__set_app_type
_o__set_fmode
_o__set_new_mode
_o__wcsicmp
_o_exit
_o_free
_o_malloc
_o_memset
_o_terminate
__C_specific_handler
_CxxThrowException
_o___stdio_common_vswprintf
_o___stdio_common_vsprintf_s
__CxxFrameHandler3
_o___stdio_common_vsnprintf_s
_o___std_exception_destroy
_o___std_exception_copy
_o___p__commode
_o___p___wargv
_o___p___argc
memcpy
ntdll
RtlVirtualUnwind
RtlGetVersion
RtlLookupFunctionEntry
RtlCaptureContext
shell32
ShellExecuteExW
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
GetModuleFileNameA
api-ms-win-core-synch-l1-2-0
ReleaseSRWLockShared
AcquireSRWLockExclusive
SetEvent
CreateEventExW
CreateMutexExW
EnterCriticalSection
Sleep
InitializeCriticalSectionEx
OpenSemaphoreW
WaitForSingleObjectEx
DeleteCriticalSection
ReleaseMutex
ResetEvent
WaitForSingleObject
CreateEventW
ReleaseSemaphore
LeaveCriticalSection
CreateSemaphoreExW
ReleaseSRWLockExclusive
AcquireSRWLockShared
api-ms-win-core-heap-l1-2-0
HeapAlloc
GetProcessHeap
HeapFree
api-ms-win-core-errorhandling-l1-1-1
SetLastError
UnhandledExceptionFilter
GetLastError
SetUnhandledExceptionFilter
api-ms-win-core-processthreads-l1-1-2
GetCurrentProcessId
GetCurrentThreadId
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
api-ms-win-core-localization-l1-2-1
FormatMessageW
api-ms-win-core-debug-l1-1-1
IsDebuggerPresent
OutputDebugStringW
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-sysinfo-l1-2-1
GetSystemTimeAsFileTime
GetSystemTime
api-ms-win-eventing-provider-l1-1-0
EventUnregister
EventSetInformation
EventRegister
EventWriteTransfer
api-ms-win-core-registry-l1-1-0
RegCloseKey
RegCreateKeyExW
api-ms-win-core-com-l1-1-1
CoCreateGuid
IIDFromString
CoCreateInstance
CoRegisterClassObject
CoInitializeEx
CoUninitialize
CoRevokeClassObject
api-ms-win-core-winrt-error-l1-1-1
RoOriginateError
api-ms-win-core-util-l1-1-0
EncodePointer
DecodePointer
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-interlocked-l1-2-0
InitializeSListHead
api-ms-win-core-registry-l1-1-1
RegSetKeyValueW
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 41KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ