typeperf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6dc90e7f9c496c40f658144a0e6155d5630caf701aa87023c5aae517329daec1N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6dc90e7f9c496c40f658144a0e6155d5630caf701aa87023c5aae517329daec1N.exe
Resource
win10v2004-20241007-en
General
-
Target
6dc90e7f9c496c40f658144a0e6155d5630caf701aa87023c5aae517329daec1N
-
Size
66KB
-
MD5
f52a36678ebf1b7ff7cad7be0200fde0
-
SHA1
fe9a451095e392958180361d1dfba7a7bb273b62
-
SHA256
6dc90e7f9c496c40f658144a0e6155d5630caf701aa87023c5aae517329daec1
-
SHA512
90b8720a1b8ef3745b4f53a575b433b551a5d0ec93d2af911d019f8df16f4aa5da2fe09eda1ade19d6b91e502d65fd6070182259ec745ab6dceb9567069f5c32
-
SSDEEP
768:nN1/V0XyxVCaJklyV9FN8CIi3oAZe1X1FK9uTSGMFjPLsZvW2Con3wg2td4/T2US:nOM8aOi9jGAZe1lT3M1PI0smtq/TIr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6dc90e7f9c496c40f658144a0e6155d5630caf701aa87023c5aae517329daec1N
Files
-
6dc90e7f9c496c40f658144a0e6155d5630caf701aa87023c5aae517329daec1N.exe windows:6 windows x86 arch:x86
2f4e2721a4473de6a7782620c4c92707
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
kernel32
WriteConsoleW
GetConsoleOutputCP
HeapFree
GetProcessHeap
GetLastError
GetConsoleScreenBufferInfo
GetFileType
GetStdHandle
SetConsoleTextAttribute
SetEvent
InterlockedExchange
LocalFree
WriteFile
HeapAlloc
FormatMessageW
GetLocaleInfoW
GetModuleHandleW
GetModuleFileNameW
ReadConsoleW
ReadConsoleInputW
MultiByteToWideChar
ReadFile
SetConsoleMode
GetConsoleMode
FindClose
FindNextFileW
FindFirstFileW
SystemTimeToFileTime
FreeLibrary
LoadLibraryW
CloseHandle
CreateFileW
SetThreadUILanguage
GetLocalTime
WaitForSingleObject
Sleep
GetVersionExW
SetConsoleCtrlHandler
CreateEventW
HeapSetInformation
ReleaseMutex
LeaveCriticalSection
CreateThread
EnterCriticalSection
TerminateThread
CreateMutexW
InitializeCriticalSection
GetComputerNameW
DeleteCriticalSection
HeapValidate
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
UnhandledExceptionFilter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
msvcrt
fwprintf
fclose
_wfopen
wcsncmp
fgetws
??2@YAPAXI@Z
__wgetmainargs
_cexit
_exit
_XcptFilter
_initterm
_wtoi
__setusermatherr
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
_controlfp
_wcslwr
wcsstr
_wsplitpath_s
_wmakepath_s
wcschr
_amsg_exit
_getmbcp
_vsnwprintf
_wcsicmp
exit
??3@YAXPAX@Z
memset
_wcsnicmp
wcstod
wcstok
memcpy
wprintf
_ftol2
user32
LoadStringW
CharToOemW
version
VerQueryValueW
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
pdh
PdhCloseLog
PdhAddCounterW
PdhOpenQueryW
PdhExpandWildCardPathW
PdhGetFormattedCounterArrayW
PdhCollectQueryData
PdhUpdateLogW
PdhOpenLogW
PdhEnumObjectsW
PdhEnumObjectItemsW
PdhCloseQuery
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE