WPDShextAutoplay.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3f0df622480ea8de2a30f196f66eb2881bcda1de94e295f9ac06255e69911d45N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f0df622480ea8de2a30f196f66eb2881bcda1de94e295f9ac06255e69911d45N.exe
Resource
win10v2004-20240910-en
General
-
Target
3f0df622480ea8de2a30f196f66eb2881bcda1de94e295f9ac06255e69911d45N
-
Size
40KB
-
MD5
5372ea3dcd856708d3366ed5d1764d40
-
SHA1
9669a98c1f18173c50f0649ef2e5b2640c3e0083
-
SHA256
3f0df622480ea8de2a30f196f66eb2881bcda1de94e295f9ac06255e69911d45
-
SHA512
033e9867ef33952157817c8e04872cbcb30b425a765b4d688ed64b9c808929bed9ca9a9690efa7c62944e7b565f226c46b7c28a284043a0d1cd4d4d260bf8ed3
-
SSDEEP
768:x6+Z7pgKXX4q97J0Cr0gsDJ9T/xolZ8L2DEjR8PXGYgrQ4DAnisKl4qJ:x6YIg0gsl9ri7VEjiPXGY+Q4DAnisKlL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f0df622480ea8de2a30f196f66eb2881bcda1de94e295f9ac06255e69911d45N
Files
-
3f0df622480ea8de2a30f196f66eb2881bcda1de94e295f9ac06255e69911d45N.exe windows:6 windows x64 arch:x64
e9d24fd156dcd87d41f9afa582376eeb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegCloseKey
RegQueryValueExW
TraceMessage
kernel32
SetEvent
GetVersion
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetLastError
CompareStringW
CreateProcessW
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
CreateEventW
WaitForSingleObject
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
user32
SendMessageW
FindWindowW
UnregisterClassA
msvcrt
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
??1type_info@@UEAA@XZ
__set_app_type
_fmode
_commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_cexit
_CxxThrowException
_exit
_XcptFilter
__getmainargs
__CxxFrameHandler3
__C_specific_handler
memset
free
wcstok
wcschr
_vscwprintf
vswprintf_s
memmove_s
memcpy_s
??_U@YAPEAX_K@Z
_wcsicmp
??_V@YAXPEAX@Z
_vsnwprintf
??2@YAPEAX_K@Z
??3@YAXPEAX@Z
memcpy
_ismbblead
oleaut32
SysFreeString
SysAllocString
shlwapi
StrRStrIW
ole32
CreateBindCtx
CoCreateInstance
CoRegisterClassObject
CoRevokeClassObject
CoInitializeEx
CoUninitialize
CLSIDFromString
setupapi
SetupDiGetClassDevsExW
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiOpenDevRegKey
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceAlias
SetupDiOpenDeviceInterfaceW
shell32
SHParseDisplayName
ord155
ShellExecuteExW
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�> Size: 512B - Virtual size: 274B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ