c:\constructicon\builds\gfx\three\23.20\drivers\2d\dal\eeu\build\service\wNow64a\B_rel\atiesrxx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6ffaa051a29c8c68dfaab7c210613100e5724deb06a4061495adb3787d7e1923N.exe
Resource
win7-20240903-en
General
-
Target
6ffaa051a29c8c68dfaab7c210613100e5724deb06a4061495adb3787d7e1923N
-
Size
1.1MB
-
MD5
4caabc8a73a5805df21dee78aa2aa550
-
SHA1
9ac85773b33a08758a2fa16c1c0cffc4834897ce
-
SHA256
6ffaa051a29c8c68dfaab7c210613100e5724deb06a4061495adb3787d7e1923
-
SHA512
ce394879dd66b15364b2ccb618c9c73ba71262493cdc26875e862f64edd127ff644fc06e45fc08133c11fbe6a26abb0b807a20651d6b5a0f1c8ebb2d2e2d90dc
-
SSDEEP
24576:0XWIDSG0qIwDE1j6tsqjnhMgeiCl7G0nehbGZpbD:0nDKKDmg27RnWGj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ffaa051a29c8c68dfaab7c210613100e5724deb06a4061495adb3787d7e1923N
Files
-
6ffaa051a29c8c68dfaab7c210613100e5724deb06a4061495adb3787d7e1923N.exe windows:6 windows x64 arch:x64
805bdc4c185349f857890b1db73945b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
RegisterDeviceNotificationA
UnregisterDeviceNotification
PostMessageA
UnregisterPowerSettingNotification
RegisterPowerSettingNotification
PostThreadMessageA
RedrawWindow
GetSysColor
SetSysColors
SystemParametersInfoA
advapi32
RegNotifyChangeKeyValue
SetEntriesInAclW
FreeSid
AllocateAndInitializeSid
RegEnumValueA
SetSecurityDescriptorDacl
RevertToSelf
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
RegGetValueW
RegGetValueA
CreateProcessAsUserA
OpenProcessToken
OpenThreadToken
AdjustTokenPrivileges
ImpersonateSelf
LookupPrivilegeValueA
CloseServiceHandle
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
RegisterServiceCtrlHandlerExA
SetServiceStatus
StartServiceCtrlDispatcherA
EventRegister
EventUnregister
EventWriteTransfer
RegCloseKey
RegOpenCurrentUser
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegSetValueExW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
WTSQueryUserToken
WTSEnumerateProcessesA
psapi
GetModuleBaseNameA
EnumProcessModules
userenv
UnloadUserProfile
LoadUserProfileA
powrprof
PowerWriteACValueIndex
PowerWriteDCValueIndex
PowerGetActiveScheme
PowerSetActiveScheme
PowerSettingAccessCheck
PowerReadACValueIndex
PowerReadDCValueIndex
PowerEnumerate
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
CM_Locate_DevNodeA
CM_Reenumerate_DevNode
SetupDiGetHwProfileList
SetupDiSetClassInstallParamsA
CM_Get_Device_ID_ExA
CM_Get_DevNode_Status
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
dwmapi
DwmIsCompositionEnabled
shlwapi
StrStrIA
kernel32
SetConsoleCtrlHandler
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
OutputDebugStringW
WideCharToMultiByte
GetConsoleMode
GetConsoleOutputCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
IsThreadAFiber
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetTempPathW
GetFileType
HeapAlloc
HeapFree
GetCommandLineW
CreateFileW
GetModuleHandleExW
ExitProcess
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcmpiA
WaitForSingleObject
GetSystemDirectoryA
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
WTSGetActiveConsoleSessionId
GetEnvironmentVariableA
GetFileAttributesA
CloseHandle
TerminateProcess
CreateProcessA
OpenProcess
QueryFullProcessImageNameA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetLastError
GetCurrentThread
GetModuleFileNameA
GetFirmwareEnvironmentVariableA
SetFirmwareEnvironmentVariableA
FreeResource
LoadResource
LockResource
FindResourceExA
GetSystemDefaultLangID
OutputDebugStringA
GetLocalTime
VerSetConditionMask
DeleteFileA
FindClose
FindFirstFileA
SetEndOfFile
RemoveDirectoryA
Sleep
GetWindowsDirectoryA
VerifyVersionInfoW
ReleaseMutex
CreateMutexA
OpenMutexA
SetEvent
ResetEvent
CreateEventA
OpenEventA
WaitForMultipleObjects
CreateThread
SetThreadPriority
TerminateThread
CreateFileA
FlushFileBuffers
ReadFile
WriteFile
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
LocalFree
GetCurrentProcess
GetCurrentProcessId
GetPackageFamilyName
ExpandEnvironmentStringsA
QueryPerformanceCounter
QueryPerformanceFrequency
DeviceIoControl
LocalAlloc
GetModuleFileNameW
HeapSize
HeapReAlloc
WriteConsoleW
GetCommandLineA
FindNextFileA
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
EncodePointer
RtlUnwind
GetStdHandle
Sections
.text Size: 457KB - Virtual size: 456KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE