msdtcexe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b15337a164087b167a2b7be564d9206b535f102230c8721b6901a66ebc953c08N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b15337a164087b167a2b7be564d9206b535f102230c8721b6901a66ebc953c08N.exe
Resource
win10v2004-20241007-en
General
-
Target
b15337a164087b167a2b7be564d9206b535f102230c8721b6901a66ebc953c08N
-
Size
158KB
-
MD5
f5e176e4c31e90584d500a43a46f24c0
-
SHA1
396f8c3e113a3bdc32c734c508250a2b42832156
-
SHA256
b15337a164087b167a2b7be564d9206b535f102230c8721b6901a66ebc953c08
-
SHA512
f40b50598ec3fbb30a903c34010f44806c698718b051640c1753511806bed273d463a080a790032b4a8e09f518e93e5e5ca7cee53e05942ecc066eb887c16916
-
SSDEEP
3072:nVEFxMwSsk2v7fcmEAkyXiqjZ0p6V6dXFy:2LTSskwkyXnU6VAV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b15337a164087b167a2b7be564d9206b535f102230c8721b6901a66ebc953c08N
Files
-
b15337a164087b167a2b7be564d9206b535f102230c8721b6901a66ebc953c08N.exe windows:6 windows x86 arch:x86
891c448cce61dc42acbb35987026f0d5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
UnregisterWait
TlsFree
TlsAlloc
TlsGetValue
LocalAlloc
LocalFree
IsDebuggerPresent
GetCurrentThread
GetThreadContext
DebugBreak
ExpandEnvironmentStringsW
CreateDirectoryW
CreateProcessW
GetExitCodeProcess
FindFirstFileW
FindNextFileW
SetFileAttributesW
DeleteFileW
FindClose
GetModuleHandleW
FindResourceW
LoadResource
LockResource
FormatMessageW
GetModuleFileNameW
LoadLibraryExW
DeleteCriticalSection
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
CreateEventA
CloseHandle
WaitForSingleObjectEx
SetEvent
ResetEvent
FreeLibrary
CreateFileW
GetProcAddress
LoadLibraryA
GetFullPathNameW
GetLastError
QueryFullProcessImageNameW
GetLocalTime
QueueUserWorkItem
OutputDebugStringW
GetSystemWindowsDirectoryA
InitializeCriticalSectionAndSpinCount
ole32
CoGetObjectContext
StringFromGUID2
CoInitializeEx
CoCreateInstance
CoUninitialize
msvcrt
?what@exception@@UBEPBDXZ
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_CxxThrowException
_onexit
_lock
__dllonexit
_unlock
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
??0exception@@QAE@XZ
_wfopen
_purecall
__CxxFrameHandler3
_wstrdate
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
free
_callnewh
malloc
wcschr
_wstrtime
_local_unwind4
_waccess
_vsnwprintf
_wcsicmp
memset
fopen
fclose
fflush
fprintf
fwprintf
wcsrchr
memcpy
??1type_info@@UAE@XZ
msdtctm
ord4
ntdll
RtlCaptureContext
RtlReportException
version
VerQueryValueW
user32
EndDialog
SetDlgItemTextW
CloseWindowStation
CloseDesktop
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationW
DialogBoxParamW
OpenDesktopW
SetThreadDesktop
GetDesktopWindow
GetWindowRect
GetClientRect
MapWindowPoints
SetWindowPos
LoadStringW
SetProcessWindowStation
advapi32
RegSetValueExW
RegQueryValueExW
OpenProcessToken
GetTokenInformation
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE