TrustedInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
256a0ebf589ff802e67edc8b720946902011c6711668d8b3c2ac7bbda8940d2c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
256a0ebf589ff802e67edc8b720946902011c6711668d8b3c2ac7bbda8940d2c.exe
Resource
win10v2004-20240802-en
General
-
Target
256a0ebf589ff802e67edc8b720946902011c6711668d8b3c2ac7bbda8940d2c
-
Size
224KB
-
MD5
bee90de4650dee8b8ecf2a49ffe25c4b
-
SHA1
0df01728930fdf73383883d5b27a251e0ad5c8ec
-
SHA256
256a0ebf589ff802e67edc8b720946902011c6711668d8b3c2ac7bbda8940d2c
-
SHA512
b592823508b852d2416d4dfd2c359b88355ee1074757badf517d0fcbd2267b0b0081afc2f7de367ef3cb253af410027e6e244b4583c13ead724efcbb416d43cd
-
SSDEEP
6144:WXE0MESQNiq7ioHH1G/zAnsqPPGhJ94HXmz:WXhG+nn4/zAno/2m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 256a0ebf589ff802e67edc8b720946902011c6711668d8b3c2ac7bbda8940d2c
Files
-
256a0ebf589ff802e67edc8b720946902011c6711668d8b3c2ac7bbda8940d2c.exe windows:6 windows x86 arch:x86
eb3d4b4843183a5b71eaed184f4ed764
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
SetServiceStatus
RegCloseKey
RegOpenKeyExW
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
OpenProcessToken
RegOpenKeyW
RegCreateKeyExW
RegDeleteKeyW
CloseServiceHandle
InitiateShutdownW
LookupPrivilegeValueW
AdjustTokenPrivileges
ChangeServiceConfigW
QueryServiceConfigW
OpenSCManagerW
OpenServiceW
RegQueryValueExW
RegEnumValueW
kernel32
LoadLibraryW
GetSystemDirectoryW
GetTickCount
QueryPerformanceCounter
CreateDirectoryW
ExpandEnvironmentStringsW
GetFullPathNameW
GetFileAttributesExW
GetProcAddress
GetFileAttributesW
GetVersionExW
lstrlenW
GetEnvironmentVariableW
GetSystemTime
MoveFileExW
GetWindowsDirectoryW
CreateProcessW
CreateFileW
SetFileTime
GetExitCodeProcess
FindFirstFileW
CompareFileTime
FindNextFileW
DeleteFileW
FindClose
OutputDebugStringA
UnhandledExceptionFilter
TerminateProcess
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
GetSystemTimeAsFileTime
GetCurrentProcessId
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpW
ExitProcess
HeapSetInformation
CreateEventW
GetLastError
CreateThread
WaitForMultipleObjects
TerminateThread
WaitForSingleObject
GetExitCodeThread
CloseHandle
SetEvent
InterlockedExchange
GetCurrentThreadId
msvcrt
__set_app_type
wcstoul
??2@YAPAXI@Z
_vsnwprintf
_vsnprintf
memset
memcpy
??3@YAXPAX@Z
__wgetmainargs
_cexit
_exit
_controlfp
_except_handler4_common
?terminate@@YAXXZ
wcsrchr
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
ole32
CoDisconnectContext
CoRevokeClassObject
CoSuspendClassObjects
CoCreateInstance
CoRegisterClassObject
CoInitializeSecurity
CoInitializeEx
CoGetMalloc
CoUninitialize
CoResumeClassObjects
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE