D:\Jenkins\workspace\atkexComSvc\x64\Release\atkexComSvc_x64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
627aa6e577731980d428cebee61c5a9cebc72467ef1c8dda4e160a1e26447bb5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
627aa6e577731980d428cebee61c5a9cebc72467ef1c8dda4e160a1e26447bb5.exe
Resource
win10v2004-20241007-en
General
-
Target
627aa6e577731980d428cebee61c5a9cebc72467ef1c8dda4e160a1e26447bb5
-
Size
1.6MB
-
MD5
7571815ca2cbd9f07cad393d55155f0a
-
SHA1
f9f84412b1679ea9d30853624cff8b7f79d08bab
-
SHA256
627aa6e577731980d428cebee61c5a9cebc72467ef1c8dda4e160a1e26447bb5
-
SHA512
17bb5fb163cb279d60eaed97c7b7599701e118e47928611e1c06a5047a9b2957b4f5fe61e21b8248c29bf574ac1f1ec0388ae83d30848333ea33da28847c3b2c
-
SSDEEP
49152:oc24PnPD2yVs0TcrrnAXWyj6qF0H5SW6H8DS52tdDpbRZy:u4PnPDlVs0TcrrnAXv3F0H5SSDntdDpO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 627aa6e577731980d428cebee61c5a9cebc72467ef1c8dda4e160a1e26447bb5
Files
-
627aa6e577731980d428cebee61c5a9cebc72467ef1c8dda4e160a1e26447bb5.exe windows:6 windows x64 arch:x64
ba38bed58bcd5a7c92ae0df3eae22325
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
winmm
timeGetTime
atkex
ord2
ord3
kernel32
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStdHandle
GetConsoleMode
WriteConsoleA
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
WriteConsoleW
GetFileAttributesA
GetCurrentProcessId
GetCurrentThreadId
GetDynamicTimeZoneInformation
DecodePointer
RaiseException
InitializeCriticalSectionEx
GetModuleHandleW
LoadLibraryExW
LoadResource
SizeofResource
FindResourceW
lstrcmpiW
ReleaseMutex
WaitForSingleObject
CreateMutexW
DeleteFileA
SetFileAttributesA
SetEvent
OpenEventW
LoadLibraryA
SetDllDirectoryW
GetCommandLineW
DeleteFileW
CreateThread
lstrcpyW
GetCurrentThread
GetNativeSystemInfo
SetThreadAffinityMask
SetThreadPriority
GetExitCodeThread
SuspendThread
ResumeThread
GetCurrentProcess
GetFileAttributesW
GetFileAttributesExW
LocalFree
CreateDirectoryW
ResetEvent
K32EnumDeviceDrivers
K32GetDeviceDriverBaseNameW
ReadConsoleW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
HeapSize
GetTimeZoneInformation
EnumSystemLocalesW
GetLastError
CloseHandle
WriteFile
ReadFile
FlushFileBuffers
CreateFileW
CreateFileA
WritePrivateProfileStringW
WritePrivateProfileStringA
GetPrivateProfileStringW
GetPrivateProfileStringA
GetPrivateProfileIntW
GetModuleFileNameA
GetModuleHandleA
OutputDebugStringW
OutputDebugStringA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameW
FreeLibrary
GetTickCount
LoadLibraryW
GetProcAddress
Sleep
CreateEventW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileSizeEx
GetConsoleCP
HeapAlloc
HeapFree
ExitProcess
MoveFileExW
RemoveDirectoryW
SetEnvironmentVariableW
GetModuleHandleExW
ExitThread
GetFileType
SetStdHandle
RtlPcToFileHeader
RtlUnwindEx
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
VirtualAlloc
GetVersionExW
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
QueryPerformanceCounter
TryEnterCriticalSection
FormatMessageW
FindClose
FindFirstFileExW
FindNextFileW
SetEndOfFile
SetFilePointerEx
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
CreateTimerQueue
SignalObjectAndWait
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
user32
LoadStringW
GetMessageW
CharNextW
DispatchMessageW
PostThreadMessageW
CharUpperW
MessageBoxW
MessageBoxA
TranslateMessage
wsprintfW
advapi32
GetNamedSecurityInfoW
QueryServiceStatus
RegOpenKeyExA
RegNotifyChangeKeyValue
BuildTrusteeWithSidW
SetNamedSecurityInfoW
GetAce
FreeSid
EqualSid
DeleteAce
AllocateAndInitializeSid
StartServiceW
StartServiceCtrlDispatcherW
SetServiceStatus
RegisterServiceCtrlHandlerW
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
ChangeServiceConfigW
RegQueryValueExW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
shell32
SHGetFolderPathAndSubDirW
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoRevokeClassObject
CoResumeClassObjects
CoAddRefServerProcess
CoReleaseServerProcess
StringFromGUID2
CoCreateInstance
CoRegisterClassObject
oleaut32
SysAllocString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
UnRegisterTypeLi
RegisterTypeLi
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantCopy
VariantClear
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysFreeString
shlwapi
PathIsDirectoryW
ord217
PathFileExistsW
Sections
.text Size: 644KB - Virtual size: 643KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 239KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE