C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x86\avDump.pdb
Static task
static1
Behavioral task
behavioral1
Sample
107.exe
Resource
win7-20241010-en
General
-
Target
107.exe
-
Size
3.9MB
-
MD5
468bbc70a56325cc39d82e796879faa2
-
SHA1
5488f804a50f35be53fbf646ecb75d0211f180f3
-
SHA256
4732e7bbf0eb82ab024b4758bab398bb45320f45dbec2073bda054cce01b6d61
-
SHA512
a133fb50cdfbd9e74b6e8ba3d63819e70eba4f57ac47e8a26780074613bf94eb74971bd46906e1b395c4df27d77a9fcf66f4d777df65da5cca23b5d1c5277152
-
SSDEEP
49152:PuyQz1ISCnS/djRooJTK7sY7vvvUcwAfUOoYaKggtMt+tK+7xzy1AyBS9oZcTCIF:P81ISCnqjn7Y7v3UcwOwwVpu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 107.exe
Files
-
107.exe.exe windows:6 windows x86 arch:x86
fbc7cf9faa1ae4978ded5d38c7a3b6d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
rpcrt4
RpcEpUnregister
RpcEpRegisterW
RpcObjectSetType
RpcServerRegisterIf2
RpcServerUnregisterIfEx
RpcImpersonateClient
RpcAsyncCompleteCall
RpcMgmtEpEltInqNextW
RpcMgmtEpEltInqBegin
RpcIfInqId
RpcMgmtEpEltInqDone
UuidCreate
RpcBindingFree
RpcBindingToStringBindingW
RpcAsyncCancelCall
RpcAsyncInitializeHandle
NdrAsyncClientCall
NdrAsyncServerCall
UuidToStringW
UuidFromStringW
RpcRevertToSelf
I_RpcBindingInqLocalClientPID
RpcStringFreeW
RpcServerUseProtseqEpW
RpcServerRegisterIfEx
RpcServerUnregisterIf
NdrServerCall2
NdrClientCall2
RpcStringBindingParseW
RpcBindingFromStringBindingW
RpcStringBindingComposeW
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
shell32
SHGetFolderPathW
ord165
ntdll
NtOpenKey
NtQueryKey
NtDeleteKey
RtlCaptureContext
RtlNtStatusToDosError
VerSetConditionMask
NtClose
NtSystemDebugControl
NtCreateWorkerFactory
NtQueryInformationProcess
NtQuerySystemInformation
NtQueryInformationWorkerFactory
RtlDllShutdownInProgress
RtlUnwind
NtSetInformationThread
kernel32
LocalFree
SetFilePointerEx
UnlockFileEx
LockFileEx
GetFileSizeEx
ReadFile
CompareStringW
GetCurrentProcess
GetCurrentThread
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetThreadId
CreateProcessW
WriteFile
GetExitCodeProcess
ResumeThread
GetPriorityClass
GetProcessTimes
K32GetProcessMemoryInfo
InitializeCriticalSectionEx
LoadLibraryW
CompareFileTime
QueryFullProcessImageNameW
FlushFileBuffers
DeleteFileW
GetFileInformationByHandle
GetFullPathNameW
OutputDebugStringA
FileTimeToSystemTime
GetCurrentProcessId
TlsAlloc
TlsGetValue
TlsSetValue
FreeLibrary
ResetEvent
GetSystemInfo
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
GetThreadTimes
ExpandEnvironmentStringsW
GetFileAttributesW
LoadLibraryExW
GetSystemDirectoryW
SetErrorMode
VirtualProtect
Sleep
HeapReAlloc
GlobalMemoryStatusEx
SetThreadPriority
GetThreadPriority
TerminateThread
GetExitCodeThread
TlsFree
SetFilePointer
SetEndOfFile
MoveFileExW
GetWindowsDirectoryW
DuplicateHandle
FindFirstFileW
FindClose
CreateDirectoryW
FindFirstFileExW
FindNextFileW
QueryDosDeviceW
GetEnvironmentVariableW
SetFileInformationByHandle
GetDiskFreeSpaceExW
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
VirtualQuery
GetSystemTimes
GetTickCount64
RaiseException
GetFileType
ExitProcess
GetCommandLineW
GetCommandLineA
GetStdHandle
FreeLibraryAndExitThread
ExitThread
InitializeCriticalSectionAndSpinCount
InterlockedPushEntrySList
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentThreadId
GetModuleHandleExW
GetModuleFileNameA
SetLastError
RegisterWaitForSingleObject
HeapFree
GetProcessHeap
HeapAlloc
GetModuleFileNameW
VerifyVersionInfoW
SetConsoleCtrlHandler
SetDllDirectoryW
GetProcAddress
GetModuleHandleW
WaitForSingleObject
GetProcessId
GetNamedPipeServerProcessId
GetFileTime
MultiByteToWideChar
ContinueDebugEvent
DebugActiveProcessStop
GetFileAttributesExW
GetSystemTimeAsFileTime
ReadProcessMemory
OpenThread
DebugBreakProcess
CreateFileW
DeviceIoControl
SetEvent
WaitForDebugEvent
DebugSetProcessKillOnExit
DebugActiveProcess
WideCharToMultiByte
VirtualQueryEx
GetThreadContext
K32GetProcessImageFileNameW
K32GetModuleBaseNameW
K32EnumProcessModules
OpenProcess
WaitForMultipleObjects
GetLastError
CreateEventW
CloseHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
SetStdHandle
HeapSize
WriteConsoleW
QueryUnbiasedInterruptTime
CancelIoEx
GetOverlappedResult
ReadDirectoryChangesW
UnregisterWaitEx
ProcessIdToSessionId
QueryThreadCycleTime
WaitForThreadpoolWaitCallbacks
ReleaseSRWLockShared
AcquireSRWLockShared
GetCPInfo
CloseThreadpoolWait
SetThreadpoolWait
CreateThreadpoolWait
LCMapStringEx
DecodePointer
EncodePointer
GetLocaleInfoEx
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
WakeAllConditionVariable
WakeConditionVariable
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetFileInformationByHandleEx
LoadLibraryExA
SetUnhandledExceptionFilter
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
K32GetPerformanceInfo
CheckRemoteDebuggerPresent
FlushInstructionCache
K32EnumProcesses
GetProcessHandleCount
CreateIoCompletionPort
TerminateProcess
SetEnvironmentVariableW
CreateThread
GetNativeSystemInfo
WaitForSingleObjectEx
FormatMessageA
GetStringTypeW
AreFileApisANSI
user32
PostMessageW
GetSystemMetrics
SetWindowLongW
SendMessageW
RegisterWindowMessageW
LoadStringW
GetGUIThreadInfo
SendMessageCallbackW
IsHungAppWindow
PeekMessageW
RegisterClassExW
GetClassInfoExW
advapi32
OpenSCManagerW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegQueryMultipleValuesW
RegDeleteTreeW
RegNotifyChangeKeyValue
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryInfoKeyW
RegDeleteValueW
RegEnumValueW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
FreeSid
EqualSid
GetTokenInformation
CheckTokenMembership
DuplicateToken
RegOpenKeyExW
StartServiceW
QueryServiceStatus
AllocateAndInitializeSid
RevertToSelf
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
CloseServiceHandle
ControlService
ChangeServiceConfigW
CreateServiceW
DeleteService
OpenServiceW
StartServiceCtrlDispatcherW
ChangeServiceConfig2W
QueryServiceConfig2W
RegisterServiceCtrlHandlerExW
SetServiceStatus
SetThreadToken
powrprof
CallNtPowerInformation
shlwapi
PathRemoveFileSpecW
PathFindFileNameW
PathAppendW
ole32
CoCreateGuid
Exports
Exports
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 601KB - Virtual size: 600KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 379KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 894KB - Virtual size: 894KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ