wlanext.pdb
Static task
static1
Behavioral task
behavioral1
Sample
61c3542b61edee7a397ffe4e6616d86cf971991b12995f3f8ab0c6b4c6a4beb0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
61c3542b61edee7a397ffe4e6616d86cf971991b12995f3f8ab0c6b4c6a4beb0.exe
Resource
win10v2004-20241007-en
General
-
Target
61c3542b61edee7a397ffe4e6616d86cf971991b12995f3f8ab0c6b4c6a4beb0
-
Size
86KB
-
MD5
7b578d1cac3f5df0ec75fb4bb938eac6
-
SHA1
4f4696b4eb736b2de18844bda6d6821b95a4c7f8
-
SHA256
61c3542b61edee7a397ffe4e6616d86cf971991b12995f3f8ab0c6b4c6a4beb0
-
SHA512
6123f454ee459a0d446d4240dd4d6856b10cf944f6227310fe64560b19cf405ae878022f7e68f145702936c5054ab94e0c118aee293465129c0478f3b7384dbf
-
SSDEEP
1536:UKigJ33qOS01cNgXYF6X75MXnCC5Lqnvoj+wVjtZPTY8lOAK7HQO7MYaO:5JHqScN8Ks75MCC5LqnveLTK7V7w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61c3542b61edee7a397ffe4e6616d86cf971991b12995f3f8ab0c6b4c6a4beb0
Files
-
61c3542b61edee7a397ffe4e6616d86cf971991b12995f3f8ab0c6b4c6a4beb0.exe windows:6 windows x86 arch:x86
f308c04a7a727e4419f9c16f26609d5a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
TraceMessage
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
EqualSid
OpenThreadToken
GetTokenInformation
IsValidSid
GetLengthSid
CopySid
ConvertSidToStringSidW
kernel32
EnterCriticalSection
GetCurrentProcessId
FreeLibrary
GetProcAddress
LoadLibraryW
CreateThread
SetEvent
LocalFree
LeaveCriticalSection
SetLastError
CreateFileW
BindIoCompletionCallback
WriteFile
GetTickCount64
ReadFile
HeapSetInformation
InterlockedIncrement
HeapFree
GetProcessHeap
HeapAlloc
InitializeCriticalSectionAndSpinCount
ResetEvent
DeleteCriticalSection
GetCurrentThread
InitializeCriticalSection
DeleteTimerQueueTimer
CreateTimerQueue
CreateTimerQueueTimer
DeleteTimerQueueEx
ChangeTimerQueueTimer
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
CreateEventW
WaitForSingleObject
InterlockedDecrement
InterlockedExchange
Sleep
TerminateProcess
ExitProcess
GetLastError
GetCurrentProcess
CloseHandle
InterlockedCompareExchange
QueueUserWorkItem
msvcrt
_controlfp
?terminate@@YAXXZ
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
memcpy
_wtol
memset
rpcrt4
NdrClientCall2
RpcServerListen
RpcAsyncCompleteCall
RpcMgmtStopServerListening
RpcMgmtWaitServerListen
RpcImpersonateClient
I_RpcExceptionFilter
UuidCreate
NdrAsyncServerCall
RpcServerUseProtseqW
RpcServerInqBindings
RpcEpRegisterW
RpcBindingFree
RpcStringFreeW
RpcBindingSetAuthInfoW
RpcBindingSetAuthInfoExW
RpcMgmtInqServerPrincNameW
RpcBindingSetOption
RpcEpResolveBinding
RpcBindingFromStringBindingW
RpcStringBindingComposeW
RpcBindingVectorFree
RpcServerUnregisterIfEx
RpcEpUnregister
RpcRevertToSelf
RpcBindingInqAuthClientW
RpcStringBindingParseW
RpcBindingToStringBindingW
RpcServerRegisterAuthInfoW
RpcServerRegisterIfEx
user32
GetSystemMetrics
crypt32
CryptUnprotectData
CryptProtectData
ntdll
RtlStringFromGUID
NtWaitForSingleObject
NtDeviceIoControlFile
EtwTraceMessage
RtlNtStatusToDosError
RtlFreeUnicodeString
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE