xbgmsvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
af6e2b4bee1558d47f80dfbdd877926cf289a841a958e40cdaab1b09922635bc.exe
Resource
win10v2004-20240802-en
General
-
Target
0c3c6a0126e84050ad25d57dbd1026c1.zip
-
Size
282KB
-
MD5
de6a93b3bfa6f2c7f089c2b59d972e89
-
SHA1
a94396a23644ae8a5f45666d2367d2d67c111bbd
-
SHA256
2a6a28a733c4146c99f4c5b90a30648ba670c2711df9d3a51ec3da0c20c3024a
-
SHA512
1ff569d8fe9093fdedb5e5a6ecdeec53e9efe3a1b1459e308999218e62808d9fd12c763737702134591d17e13e63b1ef430de08919a2c1ba8690062657314576
-
SSDEEP
6144:DpJESeAplOUPO/0BNtYSiMpY/brGShVNToL0I1lFvfnxxu0XYf:FJEaf28TSg2GShPapfnxC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/af6e2b4bee1558d47f80dfbdd877926cf289a841a958e40cdaab1b09922635bc
Files
-
0c3c6a0126e84050ad25d57dbd1026c1.zip.zip
Password: infected
-
af6e2b4bee1558d47f80dfbdd877926cf289a841a958e40cdaab1b09922635bc.exe windows:10 windows x64 arch:x64
Password: infected
4c9b51ec0bbedefc3b06549b56180167
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcrt
_CxxThrowException
?terminate@@YAXXZ
_lock
__C_specific_handler
_fmode
_initterm
??0exception@@QEAA@AEBQEBD@Z
_callnewh
malloc
__setusermatherr
?what@exception@@UEBAPEBDXZ
_vsnprintf_s
??0exception@@QEAA@AEBV0@@Z
memcpy
??0exception@@QEAA@XZ
_XcptFilter
??1exception@@UEAA@XZ
_purecall
_unlock
??3@YAXPEAX@Z
memcpy_s
memmove
_cexit
_commode
__dllonexit
_exit
_onexit
_vsnwprintf
??1type_info@@UEAA@XZ
_amsg_exit
exit
__set_app_type
__CxxFrameHandler3
??0exception@@QEAA@AEBQEBDH@Z
??_V@YAXPEAX@Z
__wgetmainargs
memset
api-ms-win-core-libraryloader-l1-2-0
FreeLibrary
GetModuleHandleW
GetModuleFileNameA
GetProcAddress
GetModuleHandleExW
GetModuleFileNameW
LoadLibraryExW
api-ms-win-core-synch-l1-1-0
InitializeCriticalSectionEx
WaitForSingleObject
DeleteCriticalSection
LeaveCriticalSection
ReleaseMutex
CreateMutexExW
EnterCriticalSection
OpenSemaphoreW
ReleaseSemaphore
WaitForSingleObjectEx
CreateSemaphoreExW
api-ms-win-core-heap-l1-1-0
HeapAlloc
GetProcessHeap
HeapSetInformation
HeapFree
api-ms-win-core-errorhandling-l1-1-0
GetLastError
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
api-ms-win-core-processthreads-l1-1-0
GetCurrentThread
GetCurrentProcess
TerminateProcess
GetCurrentThreadId
GetCurrentProcessId
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-debug-l1-1-0
DebugBreak
OutputDebugStringW
IsDebuggerPresent
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-sysinfo-l1-1-0
GetSystemWindowsDirectoryW
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-service-core-l1-1-0
StartServiceCtrlDispatcherW
api-ms-win-core-memory-l1-1-0
VirtualFree
VirtualAlloc
ntdll
NtQuerySystemInformation
api-ms-win-core-rtlsupport-l1-1-0
RtlCaptureContext
RtlDeleteFunctionTable
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlAddFunctionTable
api-ms-win-core-errorhandling-l1-1-2
RaiseFailFastException
api-ms-win-core-processthreads-l1-1-1
GetProcessMitigationPolicy
SetProcessMitigationPolicy
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-eventing-provider-l1-1-0
EventWriteTransfer
EventSetInformation
EventRegister
api-ms-win-security-sddl-l1-1-0
ConvertStringSecurityDescriptorToSecurityDescriptorW
api-ms-win-core-file-l1-1-0
CreateDirectoryW
GetFileSizeEx
WriteFile
ReadFile
CreateFileW
api-ms-win-core-heap-l2-1-0
LocalFree
api-ms-win-core-version-l1-1-1
GetFileVersionInfoSizeW
GetFileVersionInfoW
api-ms-win-core-version-l1-1-0
VerQueryValueW
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ