C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x64\aswAvBootTimeScanShMin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aaf29295c06a2fc597e22677a776432cadbbce6160c1d07877968dbe6998583c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aaf29295c06a2fc597e22677a776432cadbbce6160c1d07877968dbe6998583c.exe
Resource
win10v2004-20241007-en
General
-
Target
aaf29295c06a2fc597e22677a776432cadbbce6160c1d07877968dbe6998583c.exe
-
Size
1.6MB
-
MD5
8bb6cedae336139f2df6a2dfbeceeb28
-
SHA1
b136c224a82602d029c9f3640bc80493af84e9c4
-
SHA256
aaf29295c06a2fc597e22677a776432cadbbce6160c1d07877968dbe6998583c
-
SHA512
02646b2d224ad15b13f4578ca2b3eabafd1bd7810f81151944f711f16519063df5b17d678b2d531fda1554d7d2df7d1c458fde934a447baf60cc4f88d8a50235
-
SSDEEP
24576:0rT+XLHQ3Fz4ooGliajnoThXAI6Q7++Xa9rTqNErh0lhSMXlGXysvUV13xidIrp:gz7Liajn2hXAI/eJTYaUUdq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aaf29295c06a2fc597e22677a776432cadbbce6160c1d07877968dbe6998583c.exe
Files
-
aaf29295c06a2fc597e22677a776432cadbbce6160c1d07877968dbe6998583c.exe.exe windows:6 windows x64 arch:x64
a03b4119fdc8e8e7580344b10ac9b45f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
comctl32
InitCommonControlsEx
shell32
SHGetFolderPathW
ntdll
NtQueryKey
RtlNtStatusToDosError
RtlVirtualUnwind
NtSetInformationThread
NtClose
VerSetConditionMask
NtDeleteKey
RtlCaptureContext
NtOpenKey
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwindEx
RtlUnwind
kernel32
GetTickCount
GetFileAttributesW
CreateDirectoryW
LoadLibraryExW
FreeLibrary
GetFileAttributesExW
GetLocaleInfoW
WaitForSingleObject
GetCurrentProcessId
TerminateProcess
Sleep
VerifyVersionInfoW
GetExitCodeProcess
CreateProcessW
ResumeThread
WaitForMultipleObjects
GetCurrentThread
GetThreadPriority
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
LocalFree
RaiseException
GetThreadTimes
TerminateThread
SetThreadPriority
QueryPerformanceFrequency
GetSystemTimeAsFileTime
QueryPerformanceCounter
QueryThreadCycleTime
CompareStringW
InitializeProcThreadAttributeList
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
ExpandEnvironmentStringsW
GetSystemDirectoryW
GlobalMemoryStatusEx
GetExitCodeThread
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetEndOfFile
MoveFileExW
GetWindowsDirectoryW
FindClose
GetFullPathNameW
FindFirstFileExW
FindNextFileW
QueryDosDeviceW
GetLogicalDrives
GetVolumePathNameW
GetVolumeNameForVolumeMountPointW
GetEnvironmentVariableW
FlushFileBuffers
OutputDebugStringA
SetFileInformationByHandle
GetDiskFreeSpaceExW
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
GetSystemTimes
GetTickCount64
ExitThread
CreateThread
InterlockedPushEntrySList
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
GetCPInfo
LCMapStringEx
EncodePointer
WakeConditionVariable
InitOnceComplete
InitOnceBeginInitialize
TryAcquireSRWLockExclusive
WaitForSingleObjectEx
FileTimeToSystemTime
SetFilePointer
WriteFile
QueryUnbiasedInterruptTime
ReadFile
GetFileSizeEx
SetFilePointerEx
CompareFileTime
GetModuleFileNameW
InitializeCriticalSection
HeapReAlloc
HeapSize
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
DeleteFileW
LockFileEx
UnlockFileEx
CreateFileW
DeleteVolumeMountPointW
SetVolumeMountPointW
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
GetProcAddress
DecodePointer
HeapAlloc
GetLastError
GetCurrentThreadId
InitializeCriticalSectionEx
HeapFree
GetModuleFileNameA
GetModuleHandleExW
ResetEvent
CreateEventW
SetEvent
CloseHandle
SetLastError
FreeLibraryAndExitThread
GetStdHandle
ExitProcess
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
RegisterWaitForSingleObject
GetFileInformationByHandle
GetStringTypeW
IsProcessorFeaturePresent
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
user32
MsgWaitForMultipleObjectsEx
MessageBoxA
PostQuitMessage
PeekMessageW
TranslateMessage
DispatchMessageW
GetClassInfoExW
RegisterWindowMessageW
DefWindowProcW
DestroyWindow
SendMessageW
GetClientRect
ShowWindow
CreateWindowExW
GetSystemMetrics
RegisterClassExW
LoadCursorW
gdi32
GetStockObject
advapi32
RegDeleteTreeW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegQueryInfoKeyW
RegCloseKey
RegOpenKeyExW
CloseServiceHandle
CreateServiceW
ChangeServiceConfigW
StartServiceW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
RevertToSelf
EqualSid
OpenProcessToken
GetTokenInformation
OpenThreadToken
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
rpcrt4
RpcEpUnregister
UuidFromStringW
shlwapi
PathMatchSpecW
Exports
Exports
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
Sections
.text Size: 763KB - Virtual size: 763KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 346KB - Virtual size: 346KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 396KB - Virtual size: 395KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ