Elevated_MpMiniSigStub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
edc7f9edd145a5467d53b27ce06577b606f0becb3181801b30c61cbb234e68dcN.exe
Resource
win10v2004-20241007-en
General
-
Target
edc7f9edd145a5467d53b27ce06577b606f0becb3181801b30c61cbb234e68dcN
-
Size
284KB
-
MD5
b91e184369fb5945038395935ace4320
-
SHA1
d00b51b6f79ef9921823d68dcc629c3f960bdd30
-
SHA256
edc7f9edd145a5467d53b27ce06577b606f0becb3181801b30c61cbb234e68dc
-
SHA512
0c80dfa947323f39ce2b77c44730aad4172849213613086dbb5b79e894e3b1254b26a5126282c83731bdbd69cb50f33d2ed128c61b15054940d5a9c52ceccc51
-
SSDEEP
3072:VIy3z2n/kB8o/C5y45/qUjnpONgGlThC1caxAhjfg98p46xol392qng6DaAMb2ix:VR3zKkBPIl5LnlS4fOfIc4/Zng2Gm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource edc7f9edd145a5467d53b27ce06577b606f0becb3181801b30c61cbb234e68dcN
Files
-
edc7f9edd145a5467d53b27ce06577b606f0becb3181801b30c61cbb234e68dcN.exe windows:10 windows x64 arch:x64
2c7594bbeeaa17f0185c01b6bee44daf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineW
ExitProcess
HeapSetInformation
FindResourceW
FreeLibrary
LoadResource
CreateProcessW
HeapAlloc
GetSystemWindowsDirectoryW
HeapFree
CreateDirectoryW
WaitForSingleObject
GetProcessHeap
WriteFile
GetSystemDirectoryW
LoadLibraryW
SizeofResource
GetExitCodeProcess
CreateFileW
GetLastError
GetCurrentDirectoryW
GetProcAddress
LockResource
SetCurrentDirectoryW
RemoveDirectoryW
CloseHandle
DeleteFileW
SetFileAttributesW
advapi32
RegCloseKey
GetLengthSid
RegOpenKeyExW
FreeSid
IsValidSid
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
RegDeleteValueW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
RegCreateKeyExW
CopySid
OpenProcessToken
GetTokenInformation
RegSetValueExW
rpcrt4
UuidCreate
ntdll
memset
memcpy
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 255KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ