D:\security-client\update_service\Release\updateservice.pdb
Static task
static1
Behavioral task
behavioral1
Sample
984d955634d1998d9c54c2f0348f4e8397db8affb893683361f7ea821a4e83aeN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
984d955634d1998d9c54c2f0348f4e8397db8affb893683361f7ea821a4e83aeN.exe
Resource
win10v2004-20240802-en
General
-
Target
984d955634d1998d9c54c2f0348f4e8397db8affb893683361f7ea821a4e83aeN
-
Size
38KB
-
MD5
870f159b7dc49d383f2a1421c42159b0
-
SHA1
6e8264c4aca0cd472488d07c3e352324f8cac88f
-
SHA256
984d955634d1998d9c54c2f0348f4e8397db8affb893683361f7ea821a4e83ae
-
SHA512
e8a026b0c74a07a5d00aa64dace4bab33df9f100fc2dbb8bd759d0ffaed420a7065efcb89b9f8f56a3a209c806c9968a583c2f786d7fef3a6d1a796132027980
-
SSDEEP
768:X0YxgZNZSyirEGrI8B3ViAYJcikHpuOpIUSMfA1:X0YxgbZSTrnTB3ViAgc7HMOpIkf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 984d955634d1998d9c54c2f0348f4e8397db8affb893683361f7ea821a4e83aeN
Files
-
984d955634d1998d9c54c2f0348f4e8397db8affb893683361f7ea821a4e83aeN.exe windows:5 windows x86 arch:x86
48f35cea18e5563cc92aceed04adbb33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetEvent
GetProcessHeap
HeapFree
GetLastError
CreateEventW
SetUnhandledExceptionFilter
HeapAlloc
CreateProcessW
CreateMutexW
GetCommandLineW
ExitProcess
CloseHandle
WTSGetActiveConsoleSessionId
WaitForMultipleObjects
GetProcAddress
GetPrivateProfileIntW
GetModuleFileNameW
GetExitCodeProcess
GetVersionExW
Sleep
GetTickCount
GetModuleHandleW
OpenMutexW
WaitForSingleObject
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
advapi32
ReportEventW
QueryServiceStatusEx
SetServiceStatus
ChangeServiceConfigW
StartServiceW
DeregisterEventSource
RegisterServiceCtrlHandlerExW
OpenServiceW
EnumDependentServicesW
StartServiceCtrlDispatcherW
OpenSCManagerW
DeleteService
CloseServiceHandle
RegisterEventSourceW
CreateServiceW
CreateProcessAsUserW
GetTokenInformation
ControlService
msvcr90
_crt_debugger_hook
_except_handler4_common
__set_app_type
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
__p__fmode
__p__commode
_adjust_fdiv
wcscat_s
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
rand_s
_lock
_encode_pointer
__dllonexit
_unlock
_vsnwprintf
??2@YAPAXI@Z
?terminate@@YAXXZ
_local_unwind4
__CxxFrameHandler3
memset
??3@YAXPAX@Z
_purecall
_invalid_parameter_noinfo
_beginthreadex
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
memmove_s
_onexit
_CxxThrowException
msvcp90
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
?append@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@ABV12@@Z
?append@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@PB_W@Z
?append@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@I_W@Z
?insert@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@II_W@Z
?replace@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@IIABV12@@Z
??A?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAA_WI@Z
?find@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEI_WI@Z
?npos@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wtsapi32
WTSQueryUserToken
shlwapi
StrStrIW
PathQuoteSpacesW
PathAppendW
PathRemoveFileSpecW
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ