c:\src\Pstools\pskill\EXE\Release\pskill.pdb
Static task
static1
Behavioral task
behavioral1
Sample
56.exe
Resource
win7-20240708-en
General
-
Target
1cdaa3c87b640f749452205df24cd3b9338dbfac5a2c73a96ea20f41e9a799e0
-
Size
85KB
-
MD5
5d8487a7c2c353006ad40886b6cd41a0
-
SHA1
52fff7297a47cd9558f158117886236612c8be86
-
SHA256
1cdaa3c87b640f749452205df24cd3b9338dbfac5a2c73a96ea20f41e9a799e0
-
SHA512
fbe625a0c1d7b462f12b4d66acc52df622b3eb6293c549799b0daf95a907b0df292770d8456107a9b1cef5ff1434dde8659aa73715b9fc0cff0586b34e0ea8fc
-
SSDEEP
1536:Sw6ovd79W0/sZPQ0gSI84xvDiubx6xkccjIe8JH3zra33jLkDAu98KqLQU:ooF7MtZPQteulscjIeWODLkzvq/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/56
Files
-
1cdaa3c87b640f749452205df24cd3b9338dbfac5a2c73a96ea20f41e9a799e0.zip
-
56.exe windows:5 windows x86 arch:x86
df9a6f4e3a81f50ca4dd77c47ad68cf4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
netapi32
NetApiBufferFree
NetServerEnum
ws2_32
WSAStartup
gethostname
inet_ntoa
gethostbyname
mpr
WNetAddConnection2A
WNetCancelConnection2A
kernel32
CreateFileA
FreeLibrary
WriteFile
GetStdHandle
FormatMessageA
LoadLibraryExA
GetConsoleScreenBufferInfo
LockResource
SizeofResource
LoadResource
FindResourceA
DeleteFileA
GetSystemDirectoryA
GetComputerNameA
GetCurrentProcess
WideCharToMultiByte
GetTickCount
WaitForSingleObject
SetEvent
ConnectNamedPipe
ReadFile
GetFullPathNameA
GetCommandLineA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
Sleep
SetLastError
GetCommandLineW
LocalAlloc
LoadLibraryA
OpenProcess
LocalFree
GetVersion
GetLastError
TerminateProcess
CloseHandle
GetModuleHandleA
GetProcAddress
EnumSystemLocalesA
IsValidLocale
SetFilePointer
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
HeapSize
GetLocaleInfoW
GetTimeZoneInformation
SetEndOfFile
GetProcessHeap
CompareStringA
CompareStringW
GetModuleFileNameA
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
ExitThread
GetCurrentThreadId
CreateThread
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetModuleHandleW
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
DeleteCriticalSection
FatalAppExitA
VirtualAlloc
HeapReAlloc
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
MultiByteToWideChar
LCMapStringW
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
RtlUnwind
FlushFileBuffers
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
user32
LoadCursorA
SetCursor
SetWindowTextA
SendMessageA
EndDialog
GetSysColorBrush
GetDlgItem
DialogBoxIndirectParamA
InflateRect
gdi32
SetMapMode
StartDocA
StartPage
EndPage
EndDoc
GetDeviceCaps
comdlg32
PrintDlgA
advapi32
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
LogonUserA
ImpersonateLoggedOnUser
RegConnectRegistryA
RevertToSelf
ControlService
OpenSCManagerA
OpenServiceA
StartServiceA
QueryServiceStatus
CreateServiceA
CloseServiceHandle
RegCreateKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ