msdtcexe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0a5e2906a4cb21c0fffdbd3d127d0e940af04f0fafbbba04beb988231ecedad6N.exe
Resource
win10v2004-20240802-en
General
-
Target
0a5e2906a4cb21c0fffdbd3d127d0e940af04f0fafbbba04beb988231ecedad6N
-
Size
1.4MB
-
MD5
adb5d39b2ab234f73e844e9889318fe0
-
SHA1
71478ab3fdfd1ee5dbbcf2c8a5fad7c318c7af2a
-
SHA256
0a5e2906a4cb21c0fffdbd3d127d0e940af04f0fafbbba04beb988231ecedad6
-
SHA512
dff55376990051c2a84f5666096f0930f7195fde871ba613af4c321eb51dac34532a8a27301115b20d3016f7b65e6793253a27579d45a5c7b4041277c28778b2
-
SSDEEP
12288:Yb8+ky+Xc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDt3kbE:u8py+sqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a5e2906a4cb21c0fffdbd3d127d0e940af04f0fafbbba04beb988231ecedad6N
Files
-
0a5e2906a4cb21c0fffdbd3d127d0e940af04f0fafbbba04beb988231ecedad6N.exe windows:10 windows x64 arch:x64
666c3d92aa4989e26da58d0bc7688831
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-processenvironment-l1-1-0
GetCommandLineA
ExpandEnvironmentStringsW
GetCommandLineW
api-ms-win-core-com-l1-1-0
CoInitializeEx
CoTaskMemAlloc
StringFromGUID2
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoGetObjectContext
msvcrt
free
wcschr
__dllonexit
_unlock
_lock
?terminate@@YAXXZ
_CxxThrowException
_commode
_fmode
_wcmdln
_local_unwind
__C_specific_handler
_initterm
__setusermatherr
memcmp
_cexit
_exit
memcpy
exit
_onexit
__set_app_type
__wgetmainargs
_amsg_exit
fopen
fflush
fclose
fprintf
fwprintf
__CxxFrameHandler4
_vsnwprintf
_wcsicmp
_stricmp
memcpy_s
_purecall
??1exception@@UEAA@XZ
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBV0@@Z
_vsnprintf_s
memmove_s
wcsrchr
_waccess
??0exception@@QEAA@AEBQEBDH@Z
?what@exception@@UEBAPEBDXZ
strchr
_wfopen
??1type_info@@UEAA@XZ
_XcptFilter
_callnewh
malloc
memset
msdtctm
ord4
ntdll
RtlVirtualUnwind
RtlReportException
RtlLookupFunctionEntry
RtlCaptureContext
api-ms-win-core-synch-l1-2-0
Sleep
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcess
TlsFree
TlsAlloc
CreateProcessW
GetExitCodeProcess
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetStartupInfoW
TlsGetValue
OpenProcessToken
api-ms-win-core-errorhandling-l1-1-0
SetLastError
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
api-ms-win-core-libraryloader-l1-2-0
GetProcAddress
FindResourceExW
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
LoadResource
LockResource
LoadStringW
GetModuleHandleExW
GetModuleFileNameA
GetModuleHandleW
api-ms-win-core-profile-l1-1-0
QueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0
GetSystemTimeAsFileTime
GetTickCount
GetLocalTime
GetSystemWindowsDirectoryA
api-ms-win-core-registry-l1-1-0
RegOpenKeyExA
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExA
RegQueryValueExW
api-ms-win-core-file-l1-1-0
CreateFileW
FindClose
DeleteFileW
CreateDirectoryW
GetFullPathNameW
FindFirstFileW
FindNextFileW
SetFileAttributesW
api-ms-win-core-debug-l1-1-0
OutputDebugStringW
DebugBreak
IsDebuggerPresent
api-ms-win-core-synch-l1-1-0
SetEvent
ResetEvent
CreateMutexExW
AcquireSRWLockShared
DeleteCriticalSection
ReleaseMutex
WaitForSingleObjectEx
AcquireSRWLockExclusive
OpenSemaphoreW
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
LeaveCriticalSection
ReleaseSemaphore
ReleaseSRWLockExclusive
WaitForSingleObject
EnterCriticalSection
ReleaseSRWLockShared
CreateEventA
CreateSemaphoreExW
api-ms-win-core-handle-l1-1-0
CloseHandle
api-ms-win-core-psapi-l1-1-0
QueryFullProcessImageNameW
api-ms-win-core-heap-l1-1-0
HeapFree
GetProcessHeap
HeapAlloc
api-ms-win-core-threadpool-l1-2-0
CloseThreadpoolTimer
SetThreadpoolTimer
CreateThreadpoolTimer
WaitForThreadpoolTimerCallbacks
api-ms-win-core-localization-l1-2-0
FormatMessageW
api-ms-win-core-string-l1-1-0
MultiByteToWideChar
api-ms-win-core-version-l1-1-0
VerQueryValueW
api-ms-win-core-heap-l2-1-0
LocalFree
LocalAlloc
api-ms-win-security-base-l1-1-0
GetTokenInformation
kernel32
UnregisterWaitEx
QueueUserWorkItem
api-ms-win-core-delayload-l1-1-1
ResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0
DelayLoadFailureHook
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 4KB - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE