disktoast.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fad19a59532e6231014b8574ca7b869e7f407b4a293c823a50b3658efa7814fc.exe
Resource
win10v2004-20240802-en
General
-
Target
82cbdaeddca8ed1c6d8ef7779c0099f1.zip
-
Size
284KB
-
MD5
2917d73422d7b133100fdc712943b021
-
SHA1
6d0e6d95fc74b5bb957e8ca8d3254260129c64ac
-
SHA256
e8413d3f162d034b7a6a1b0b8e35f2f246211658272e70a052c3cfe4f03c6d4a
-
SHA512
fcc5c42004760f1a6f67b8e9d984acfd2f4fe397f085bf033ac8ee5233c959911db6bacde1eff5dea9fd589d9e5e2ef3adb86ae77d021da3b62f52295375da47
-
SSDEEP
6144:KuRjxZQ4pcKM3jxyzynb20bZ3iSpgPKhwreCXCHGLDU7KZfsHPazukbkLuc2Nbi:KkdS7xyzyiUZSSKKhYSHOw7CUHPaCikF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/fad19a59532e6231014b8574ca7b869e7f407b4a293c823a50b3658efa7814fc
Files
-
82cbdaeddca8ed1c6d8ef7779c0099f1.zip.zip
Password: infected
-
fad19a59532e6231014b8574ca7b869e7f407b4a293c823a50b3658efa7814fc.exe windows:10 windows x64 arch:x64
Password: infected
83665e66a39d760c9186ff74babfccf1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
LoadStringW
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_c_exit
_initterm
_initterm_e
api-ms-win-crt-private-l1-1-0
_o__callnewh
_o__cexit
_o__configthreadlocale
_o__configure_wide_argv
_o__crt_atexit
_o__errno
_o__exit
_o__get_initial_wide_environment
_o__initialize_onexit_table
_o__initialize_wide_environment
_o__invalid_parameter_noinfo
_o__purecall
_o__register_onexit_function
_o__seh_filter_exe
_o__set_app_type
_o__set_fmode
_o__set_new_mode
_o__wcsicmp
_o_exit
_o_free
_o_malloc
_o_memset
_o_terminate
__C_specific_handler
_CxxThrowException
_o___stdio_common_vswprintf
_o___stdio_common_vsprintf_s
__CxxFrameHandler3
_o___stdio_common_vsnprintf_s
_o___std_exception_destroy
_o___std_exception_copy
_o___p__commode
_o___p___wargv
_o___p___argc
memcpy
ntdll
RtlVirtualUnwind
RtlGetVersion
RtlLookupFunctionEntry
RtlCaptureContext
shell32
ShellExecuteExW
api-ms-win-core-libraryloader-l1-2-0
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
GetModuleFileNameA
api-ms-win-core-synch-l1-2-0
ReleaseSRWLockShared
AcquireSRWLockExclusive
SetEvent
CreateEventExW
CreateMutexExW
EnterCriticalSection
Sleep
InitializeCriticalSectionEx
OpenSemaphoreW
WaitForSingleObjectEx
DeleteCriticalSection
ReleaseMutex
ResetEvent
WaitForSingleObject
CreateEventW
ReleaseSemaphore
LeaveCriticalSection
CreateSemaphoreExW
ReleaseSRWLockExclusive
AcquireSRWLockShared
api-ms-win-core-heap-l1-2-0
HeapAlloc
GetProcessHeap
HeapFree
api-ms-win-core-errorhandling-l1-1-1
SetLastError
UnhandledExceptionFilter
GetLastError
SetUnhandledExceptionFilter
api-ms-win-core-processthreads-l1-1-2
GetCurrentProcessId
GetCurrentThreadId
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
api-ms-win-core-localization-l1-2-1
FormatMessageW
api-ms-win-core-debug-l1-1-1
IsDebuggerPresent
OutputDebugStringW
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-sysinfo-l1-2-1
GetSystemTimeAsFileTime
GetSystemTime
api-ms-win-eventing-provider-l1-1-0
EventUnregister
EventSetInformation
EventRegister
EventWriteTransfer
api-ms-win-core-registry-l1-1-0
RegCloseKey
RegCreateKeyExW
api-ms-win-core-com-l1-1-1
CoCreateGuid
IIDFromString
CoCreateInstance
CoRegisterClassObject
CoInitializeEx
CoUninitialize
CoRevokeClassObject
api-ms-win-core-winrt-error-l1-1-1
RoOriginateError
api-ms-win-core-util-l1-1-0
EncodePointer
DecodePointer
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-interlocked-l1-2-0
InitializeSListHead
api-ms-win-core-registry-l1-1-1
RegSetKeyValueW
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 41KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ