D:\Desktop\HookProcessV2\x64\Release\RuntimeBroker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a43538c854d719168157747c6f60b682ff4288121b18655a4995de19cbb59b05.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a43538c854d719168157747c6f60b682ff4288121b18655a4995de19cbb59b05.exe
Resource
win10v2004-20240802-en
General
-
Target
a43538c854d719168157747c6f60b682ff4288121b18655a4995de19cbb59b05
-
Size
598KB
-
MD5
7c7caa55f3218696c2fbdd7582a238a8
-
SHA1
f1fce6a1be19cf95f459c873b9539984ecf13856
-
SHA256
a43538c854d719168157747c6f60b682ff4288121b18655a4995de19cbb59b05
-
SHA512
1b811d45e08018dd3a66724590e6a2e98e5be31f3ca4268ac99a93e4177b82c410ac684a304728dda4a5386a56d42d4f812353abe7f05624f58a3f3552f0a908
-
SSDEEP
12288:pq8fNmXnybZeVBxo9Vwr0W2z1QlNMtgW893bmcn:ADybZeVBxlrN9Nigpb3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a43538c854d719168157747c6f60b682ff4288121b18655a4995de19cbb59b05
Files
-
a43538c854d719168157747c6f60b682ff4288121b18655a4995de19cbb59b05.exe windows:6 windows x64 arch:x64
7403778452cd5a68a78f96a86311a20a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetCurrentProcess
WriteFile
TerminateProcess
Module32Next
FindResourceA
WaitForSingleObject
Module32First
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
GetLastError
WriteProcessMemory
CreateFileA
GetSystemDirectoryA
LockResource
Process32Next
CloseHandle
LoadResource
GetProcAddress
VirtualAllocEx
CreateRemoteThread
CreateProcessA
VirtualFreeEx
WriteConsoleW
Process32First
SizeofResource
MoveFileExA
GetModuleFileNameA
CreateFileW
HeapReAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RaiseException
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
LCMapStringW
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
GetProcessHeap
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
HeapSize
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
SHGetFolderPathA
ole32
CoInitialize
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 474KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ