vssvc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6a66f72240e54890ee22ddc8db89b1d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a66f72240e54890ee22ddc8db89b1d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6a66f72240e54890ee22ddc8db89b1d0N
-
Size
1.0MB
-
MD5
6a66f72240e54890ee22ddc8db89b1d0
-
SHA1
b6f480b38d338ea5ebbdd41339d0c6aa33c2ded1
-
SHA256
d35c5edb0c6aee6ad29e242d2555aef356f27d3ea5b4057a934f04c259439932
-
SHA512
60d6c1fd6869f55ada26d08109cd68032d55d15c6dc3e72b02cb9a9b07fd76686cb01a4e1c2f610cc993b391cabd006de62a2d6903ca23d0c97c9696c9b41daa
-
SSDEEP
12288:WRQUC5A1a7+aGANskcgiesCvaDK/CuEjKtjkxlg5QXS9MZT40:wQUwYaaauK9vaDKKvjmkxlg5Qi9MZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a66f72240e54890ee22ddc8db89b1d0N
Files
-
6a66f72240e54890ee22ddc8db89b1d0N.exe windows:6 windows x86 arch:x86
24bbe0bfaf1028355da5ace282104fb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
SetServiceStatus
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
LookupAccountSidW
ConvertSidToStringSidW
GetLengthSid
FreeSid
AllocateAndInitializeSid
RegQueryInfoKeyW
RegEnumValueW
RegDeleteValueW
LookupAccountNameW
GetSidSubAuthorityCount
EqualDomainSid
IsValidSid
CreateWellKnownSid
AccessCheck
AdjustTokenPrivileges
LookupPrivilegeValueW
PrivilegeCheck
CheckTokenMembership
DuplicateToken
EqualSid
ConvertStringSidToSidW
AddAccessAllowedAceEx
AddAccessDeniedAceEx
GetAclInformation
GetAce
AddAce
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
CopySid
RegisterEventSourceW
ReportEventW
DeregisterEventSource
OpenThreadToken
OpenProcessToken
GetTokenInformation
kernel32
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
GetLastError
EncodePointer
GetComputerNameW
GetComputerNameExW
GetVolumeInformationW
GetVolumePathNamesForVolumeNameW
GetModuleHandleW
GetTimeZoneInformation
SetErrorMode
GetDiskFreeSpaceW
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
Sleep
EnterCriticalSection
LeaveCriticalSection
DefineDosDeviceW
ReadFile
CreateDirectoryW
SetFileAttributesW
GetEnvironmentVariableW
GetSystemWindowsDirectoryW
LoadLibraryW
GetProcAddress
CreateThread
FindFirstVolumeW
FindNextVolumeW
FindFirstFileW
FindNextFileW
ExpandEnvironmentStringsW
FindClose
FindVolumeClose
SetLastError
GetVersionExW
LoadLibraryExW
FormatMessageW
FreeLibrary
GetCurrentThread
MultiByteToWideChar
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
WriteFile
DeleteFileW
MoveFileExW
GetFileAttributesW
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedExchange
WaitForSingleObject
CloseHandle
SetWaitableTimer
CancelWaitableTimer
GetCurrentThreadId
SetEvent
CreateEventW
CreateWaitableTimerW
OpenThread
CompareStringW
GetCommandLineW
HeapSetInformation
LocalAlloc
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetSystemDirectoryW
LocalFree
ResetEvent
DeviceIoControl
CreateFileW
GetDriveTypeW
HeapFree
GetSystemTimeAsFileTime
GetTickCount64
FlushFileBuffers
GetOverlappedResult
SetThreadPriority
WaitForMultipleObjects
ResumeThread
DeleteVolumeMountPointW
RaiseException
lstrlenW
QueryDosDeviceW
SetVolumeMountPointW
user32
RegisterDeviceNotificationW
LoadStringW
UnregisterDeviceNotification
msvcrt
memset
_snwscanf_s
_wcsupr
strncmp
wcsnlen
_ultow_s
wcscpy_s
wcscat_s
swprintf_s
__CxxFrameHandler3
_purecall
_vsnwprintf
_CxxThrowException
_wcsicmp
free
_controlfp
_onexit
_lock
__dllonexit
_unlock
??1type_info@@UAE@XZ
_except_handler4_common
?terminate@@YAXXZ
wcschr
_vscwprintf
realloc
memmove
wcsncmp
_errno
_beginthreadex
memcpy
malloc
_wcsnicmp
wcsstr
qsort
??0exception@@QAE@ABQBD@Z
?what@exception@@UBEPBDXZ
wcstoul
wcsrchr
iswspace
__set_app_type
towupper
iswdigit
_vsnprintf
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_wcslwr
memcpy_s
memmove_s
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_callnewh
??0exception@@QAE@XZ
atl
ord16
ord23
ord17
ord20
ord30
ord32
ord58
ole32
CoRevertToSelf
CoImpersonateClient
CoDisconnectContext
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoCreateGuid
CLSIDFromString
CoFreeUnusedLibraries
CoGetObjectContext
StringFromCLSID
CoSetProxyBlanket
CoTaskMemRealloc
shlwapi
SHDeleteKeyW
oleaut32
VariantClear
SysAllocStringLen
SysAllocString
SysFreeString
VariantChangeType
GetErrorInfo
VariantCopy
VariantInit
LoadRegTypeLi
SysStringLen
rpcrt4
I_RpcBindingInqLocalClientPID
UuidToStringW
RpcStringFreeW
ntdll
NtThawTransactions
NtFreezeTransactions
NtQueryVolumeInformationFile
RtlNtStatusToDosErrorNoTeb
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
RtlNtStatusToDosError
NtUnloadKey
NtLoadKey
NtAdjustPrivilegesToken
NtOpenProcessToken
NtOpenThreadToken
EtwTraceMessage
RtlFreeSid
RtlSetOwnerSecurityDescriptor
RtlLengthSecurityDescriptor
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
RtlAddAccessAllowedAceEx
NtClose
NtCreateSymbolicLinkObject
RtlInitUnicodeString
RtlCreateAcl
RtlLengthSid
RtlAllocateAndInitializeSid
NtSetSecurityObject
NtCreateKey
NtDeleteValueKey
NtQueryValueKey
NtSetValueKey
NtFreezeRegistry
NtThawRegistry
NtQuerySystemInformation
RtlFreeHeap
RtlAllocateHeap
NtOpenFile
RtlGUIDFromString
RtlFreeUnicodeString
RtlStringFromGUID
NtWaitForSingleObject
NtDeviceIoControlFile
NtCreateEvent
NtAllocateUuids
LdrGetProcedureAddress
RtlInitAnsiString
LdrGetDllHandle
NtResetEvent
RtlGetVersion
NtOpenKey
NtEnumerateKey
NtQueryKey
NtQueryAttributesFile
NtDeleteKey
vssapi
?CreateVssSnapshotSetDescription@@YGJU_GUID@@JPAPAVIVssSnapshotSetDescription@@@Z
?LoadVssSnapshotSetDescription@@YGJPBGPAPAVIVssSnapshotSetDescription@@U_GUID@@@Z
VssFreeSnapshotPropertiesInternal
CreateWriter
CreateWriterEx
netapi32
NetApiBufferFree
NetShareEnum
NetLocalGroupGetMembers
NetShareGetInfo
NetShareDel
NetShareAdd
clusapi
OpenCluster
ClusterResourceControl
GetClusterResourceState
CloseClusterResource
CloseCluster
OpenClusterResource
GetNodeClusterState
xolehlp
ord9
ord8
resutils
ResUtilEnumResourcesEx
ResUtilGetResourceName
setupapi
SetupDiGetDeviceInstallParamsW
SetupDiGetDeviceRegistryPropertyW
SetupDiEnumDeviceInfo
SetupDiSetClassInstallParamsW
SetupDiCallClassInstaller
SetupDiGetClassDevsW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiDestroyDeviceInfoList
CM_Get_Parent
vsstrace
ord7
ord9
ord4
ord10
ord11
ord8
ord2
ord1
ord3
ord5
ord6
authz
AuthzReportSecurityEventFromParams
AuthzUnregisterSecurityEventSource
AuthzRegisterSecurityEventSource
virtdisk
GetStorageDependencyInformation
Sections
.text Size: 901KB - Virtual size: 900KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 102KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE