TrustedInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
40e1785917bd7281274ac71f52d33a34bfea027be38ad8b1fe8cd1e88cd64bda.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40e1785917bd7281274ac71f52d33a34bfea027be38ad8b1fe8cd1e88cd64bda.exe
Resource
win10v2004-20240802-en
General
-
Target
40e1785917bd7281274ac71f52d33a34bfea027be38ad8b1fe8cd1e88cd64bda
-
Size
185KB
-
MD5
c9d8cc8922e31f4871abce263e75df8d
-
SHA1
8d726b45fe15c8a1b31550f2e2eafde04aef8b98
-
SHA256
40e1785917bd7281274ac71f52d33a34bfea027be38ad8b1fe8cd1e88cd64bda
-
SHA512
681f7b012cbf5bb3ae1e0c13f6cdd4f79eb21be82e28eb74b7f706bb0033503a3875450deb58a7a60a4e91031f5cc2cb177b7b748c2ba4026683680cc41c6418
-
SSDEEP
3072:jXEgwW6ntfESQHtidszHi3YHHrhFdHqRRzAFHjmssqRBPAcY0z:jXE0MESQNiq7ioHH1G/zAnsqPPGY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40e1785917bd7281274ac71f52d33a34bfea027be38ad8b1fe8cd1e88cd64bda
Files
-
40e1785917bd7281274ac71f52d33a34bfea027be38ad8b1fe8cd1e88cd64bda.exe windows:6 windows x86 arch:x86
eb3d4b4843183a5b71eaed184f4ed764
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
SetServiceStatus
RegCloseKey
RegOpenKeyExW
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
OpenProcessToken
RegOpenKeyW
RegCreateKeyExW
RegDeleteKeyW
CloseServiceHandle
InitiateShutdownW
LookupPrivilegeValueW
AdjustTokenPrivileges
ChangeServiceConfigW
QueryServiceConfigW
OpenSCManagerW
OpenServiceW
RegQueryValueExW
RegEnumValueW
kernel32
LoadLibraryW
GetSystemDirectoryW
GetTickCount
QueryPerformanceCounter
CreateDirectoryW
ExpandEnvironmentStringsW
GetFullPathNameW
GetFileAttributesExW
GetProcAddress
GetFileAttributesW
GetVersionExW
lstrlenW
GetEnvironmentVariableW
GetSystemTime
MoveFileExW
GetWindowsDirectoryW
CreateProcessW
CreateFileW
SetFileTime
GetExitCodeProcess
FindFirstFileW
CompareFileTime
FindNextFileW
DeleteFileW
FindClose
OutputDebugStringA
UnhandledExceptionFilter
TerminateProcess
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
GetSystemTimeAsFileTime
GetCurrentProcessId
FreeLibrary
GetCurrentProcess
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
lstrcmpW
ExitProcess
HeapSetInformation
CreateEventW
GetLastError
CreateThread
WaitForMultipleObjects
TerminateThread
WaitForSingleObject
GetExitCodeThread
CloseHandle
SetEvent
InterlockedExchange
GetCurrentThreadId
msvcrt
__set_app_type
wcstoul
??2@YAPAXI@Z
_vsnwprintf
_vsnprintf
memset
memcpy
??3@YAXPAX@Z
__wgetmainargs
_cexit
_exit
_controlfp
_except_handler4_common
?terminate@@YAXXZ
wcsrchr
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
ole32
CoDisconnectContext
CoRevokeClassObject
CoSuspendClassObjects
CoCreateInstance
CoRegisterClassObject
CoInitializeSecurity
CoInitializeEx
CoGetMalloc
CoUninitialize
CoResumeClassObjects
Sections
.text Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE