SpaceAgent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fc0ee1535c91effcdd48c25b34ccad80N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc0ee1535c91effcdd48c25b34ccad80N.exe
Resource
win10v2004-20240802-en
General
-
Target
fc0ee1535c91effcdd48c25b34ccad80N.exe
-
Size
115KB
-
MD5
fc0ee1535c91effcdd48c25b34ccad80
-
SHA1
678c2753f8fa516c86bddf83b90da7b4665fa22c
-
SHA256
be97c97dbd8d6fc25c4469600ecd70d21d0b28229def8dada0e130d85fafd3a6
-
SHA512
1c8387dfdc0dac72589e148937a5a18ff6369f06b158117e449e4c6bdc472fda4de010aae477e63d39db2ce996438872c1630d71164e3b80094447e4c5fd82fb
-
SSDEEP
1536:4AnT18NFPz/LtHWdg3OVxfGHwQKQhOGmaAbbkknvsa4G9SMPLPii9YDjK:1nT1EFDdzhKDDkkeILai9K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc0ee1535c91effcdd48c25b34ccad80N.exe
Files
-
fc0ee1535c91effcdd48c25b34ccad80N.exe.exe windows:6 windows x86 arch:x86
4af2ab8cff64a795b06e51e84cbc5281
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
FreeSid
EventRegister
EventWrite
EventUnregister
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
kernel32
WaitForSingleObject
CreateMutexExW
GetProcessHeap
HeapFree
SetPriorityClass
GetCurrentProcess
LocalFree
CreateThread
DeleteCriticalSection
Sleep
EnterCriticalSection
LeaveCriticalSection
ResetEvent
ReleaseMutex
CloseHandle
SetEvent
CreateEventExW
CreateEventW
WaitForMultipleObjects
InitializeCriticalSectionAndSpinCount
GetVolumeInformationW
SetLastError
FindFirstVolumeMountPointW
FindVolumeMountPointClose
GetProcAddress
FindNextVolumeMountPointW
FindNextVolumeW
FindVolumeClose
DefineDosDeviceW
GetVolumePathNamesForVolumeNameW
DeleteVolumeMountPointW
SetVolumeMountPointW
LoadLibraryExW
FreeLibrary
SetFilePointerEx
GetExitCodeThread
WriteFile
ReadFile
PeekNamedPipe
GetProcessId
GetProcessIdOfThread
GetCommandLineW
OpenProcess
GetExitCodeProcess
WaitForMultipleObjectsEx
DuplicateHandle
HeapReAlloc
InitializeCriticalSection
HeapAlloc
SetVolumeLabelW
SleepEx
VerifyVersionInfoW
VerSetConditionMask
LocalSize
CancelIo
GetOverlappedResult
WaitForSingleObjectEx
GetLastError
FindFirstVolumeW
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetModuleHandleA
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
CreateMutexW
CreateFileW
DeviceIoControl
LocalAlloc
user32
UnregisterDeviceNotification
DestroyWindow
RegisterDeviceNotificationW
DispatchMessageW
GetMessageW
PeekMessageW
CreateWindowExW
RegisterClassExW
PostThreadMessageW
UnregisterClassW
DefWindowProcW
GetWindowLongW
SetWindowLongW
msvcrt
??3@YAXPAX@Z
memcpy
memcmp
_CxxThrowException
_onexit
__dllonexit
_unlock
malloc
free
??2@YAPAXI@Z
??_V@YAXPAX@Z
_XcptFilter
__p__commode
_amsg_exit
__wgetmainargs
__set_app_type
exit
_exit
_vsnwprintf
_cexit
__p__fmode
__setusermatherr
_initterm
_wcmdln
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_controlfp
_except_handler4_common
_lock
memset
ole32
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
StringFromGUID2
oleaut32
VariantClear
SysFreeString
SysAllocString
VariantInit
shlwapi
StrToIntExW
StrCmpNIW
shell32
CommandLineToArgvW
ntdll
NtQueryObject
RtlNtStatusToDosError
RtlEqualUnicodeString
NtQueryInformationProcess
setupapi
SetupDiCreateDeviceInfoListExA
SetupDiDeleteDeviceInterfaceData
SetupDiDestroyDeviceInfoList
SetupDiCreateDeviceInfoListExW
SetupDiDeleteDeviceInfo
SetupDiOpenDeviceInterfaceW
SetupDiGetDevicePropertyW
SetupDiGetClassDevsExA
SetupDiCallClassInstaller
SetupDiOpenDeviceInfoW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassPropertyW
cfgmgr32
DevGetObjectProperties
DevFreeObjectProperties
netapi32
NetShareEnum
NetApiBufferFree
NetShareDelEx
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 31KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ