WMPNSCFG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
802fc8fe2b01ea689dddb7aa4089f080N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
802fc8fe2b01ea689dddb7aa4089f080N.exe
Resource
win10v2004-20240802-en
General
-
Target
802fc8fe2b01ea689dddb7aa4089f080N.exe
-
Size
69KB
-
MD5
802fc8fe2b01ea689dddb7aa4089f080
-
SHA1
c7006ba3b8408aa7f4ec52d1f7b2ee04359051b5
-
SHA256
785875f912a3181ab920816a796237f17cf00efd77435dbd9e2f41e9548a7976
-
SHA512
06a3abb57b36c91a37067f6fc2571753f63b40a6d23764a9ee499edf0a96623cb5c4b2c891f1e8b39727a81527167c26c5e1a99688321aedf1093b762ed1bc27
-
SSDEEP
1536:Y72GRANBewprmwtIFazzBrsp5YYWUtCoOeTgqO5i4hTChhhh5:M2GC5IFavBooYWECoOeTgqO5i4hTChhJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 802fc8fe2b01ea689dddb7aa4089f080N.exe
Files
-
802fc8fe2b01ea689dddb7aa4089f080N.exe.exe windows:6 windows x64 arch:x64
ce1a36a2a999517ca9b1c36df3b7e240
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcrt
??_V@YAXPEAX@Z
??3@YAXPEAX@Z
memcpy_s
memmove_s
free
malloc
??2@YAPEAX_K@Z
wcsncpy_s
??_U@YAPEAX_K@Z
memset
__C_specific_handler
__wgetmainargs
_XcptFilter
_exit
_cexit
exit
_wcmdln
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
realloc
_errno
_CxxThrowException
__CxxFrameHandler3
memcmp
ntdll
RtlVirtualUnwind
RtlCaptureContext
RtlLookupFunctionEntry
advapi32
ConvertSidToStringSidW
LookupAccountNameW
CopySid
OpenSCManagerW
CloseServiceHandle
OpenServiceW
RegQueryValueExW
QueryServiceConfigW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
TraceMessage
GetTraceLoggerHandle
GetTraceEnableLevel
GetTraceEnableFlags
RegisterTraceGuidsW
UnregisterTraceGuids
RegCloseKey
kernel32
LocalFree
OutputDebugStringA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
GetVersionExA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
DelayLoadFailureHook
LoadLibraryExA
GetCurrentThreadId
SetEvent
OpenEventW
FindResourceExW
LockResource
HeapSetInformation
RegisterApplicationRestart
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
EnterCriticalSection
RaiseException
GetLastError
CloseHandle
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
FreeLibrary
lstrlenW
GetProcAddress
LoadLibraryW
GetModuleHandleW
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fxdkffj Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE