SyncHost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
13a7300800e1d4864528ba9065947afcf410883d5e1db319e0c2d0df8a6eb5dd.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
13a7300800e1d4864528ba9065947afcf410883d5e1db319e0c2d0df8a6eb5dd.exe
Resource
win10v2004-20240802-en
General
-
Target
13a7300800e1d4864528ba9065947afcf410883d5e1db319e0c2d0df8a6eb5dd
-
Size
65KB
-
MD5
a89ac3b66fbf592451a38a400f9722b6
-
SHA1
fe419548d2c9adfdf606a623c5309f88e208f849
-
SHA256
13a7300800e1d4864528ba9065947afcf410883d5e1db319e0c2d0df8a6eb5dd
-
SHA512
cd130158d366c498a36327df8b7efbf391bcd2575c89640564223a02dc3d5ed5bcd3e77b90a8247ef7b37d372407ffe858fa6dea52a4e6d5c9930a9e0b97d382
-
SSDEEP
768:n5goBeis3BlqF4OH5NNk6RAMiqvztuxHGcqa22KGEsiG67I1qUuwlrYwo4beGYUs:5Mi8nqF4cNNRciJMDtzis1p3HbeGF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13a7300800e1d4864528ba9065947afcf410883d5e1db319e0c2d0df8a6eb5dd
Files
-
13a7300800e1d4864528ba9065947afcf410883d5e1db319e0c2d0df8a6eb5dd.exe windows:6 windows x86 arch:x86
16660a94f8a6a5052fe5334a712f36be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
RegEnumKeyExW
TraceMessage
kernel32
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
LoadLibraryW
GetProcAddress
GetModuleHandleW
lstrcmpiW
GetModuleFileNameW
Sleep
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
SetEvent
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetCommandLineW
DebugBreak
FormatMessageW
InterlockedExchange
GetVersionExA
OutputDebugStringA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
user32
UnregisterClassA
PostThreadMessageW
TranslateMessage
DispatchMessageW
CharUpperW
CharNextW
GetMessageW
msvcrt
malloc
free
memcpy_s
wcscpy_s
wcsncpy_s
wcscat_s
??_V@YAXPAX@Z
??_U@YAPAXI@Z
memset
??3@YAXPAX@Z
_controlfp
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
_errno
realloc
_except_handler4_common
__p__commode
__set_app_type
__p__fmode
_initterm
__setusermatherr
_amsg_exit
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
??2@YAPAXI@Z
_purecall
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
PropVariantClear
CoCreateInstance
StringFromGUID2
CoUninitialize
CoInitializeEx
CoTaskMemFree
oleaut32
GetErrorInfo
VarUI4FromStr
RegisterTypeLi
SysStringLen
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
shlwapi
SHStrDupW
propsys
PropVariantToGUID
PropVariantToUInt32
winsync
ord1
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE