c:\constructicon\builds\gfx\three\24.10\drivers\2d\dal\eeu\build\service\wNow64a\B_rel\atiesrxx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
32bba33951161d5c283bc74fa2d947d3753b6409c6c0a66e83bd0cf243725c4e.exe
Resource
win7-20240903-en
General
-
Target
32bba33951161d5c283bc74fa2d947d3753b6409c6c0a66e83bd0cf243725c4e.exe
-
Size
1.2MB
-
MD5
bca40a3e8d104a2c7a7fab6fce864584
-
SHA1
cacfc592ec807da93213c6fb3facb03b9d1987c9
-
SHA256
32bba33951161d5c283bc74fa2d947d3753b6409c6c0a66e83bd0cf243725c4e
-
SHA512
3f3520f4a1cc5b2d0570531ae1f5ab5c76c34a524fb9fdc1837f18f753186eaaaf627fb0151cf42df3142196776f75493e098e4722307d36739d72195f5abd20
-
SSDEEP
24576:wTpc2ZI+OPrhbjEy0sqjnhMgeiCl7G0nehbGZpbDg:w24I+gfQDmg27RnWGjo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32bba33951161d5c283bc74fa2d947d3753b6409c6c0a66e83bd0cf243725c4e.exe
Files
-
32bba33951161d5c283bc74fa2d947d3753b6409c6c0a66e83bd0cf243725c4e.exe.exe windows:6 windows x64 arch:x64
e63c6226e39b8fc50e6ec1a83b23feb2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
RegisterDeviceNotificationA
UnregisterDeviceNotification
PostMessageA
UnregisterPowerSettingNotification
RegisterPowerSettingNotification
PostThreadMessageA
RedrawWindow
GetSysColor
SetSysColors
SystemParametersInfoA
advapi32
RegNotifyChangeKeyValue
SetEntriesInAclW
FreeSid
AllocateAndInitializeSid
RegEnumValueA
SetSecurityDescriptorDacl
RevertToSelf
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
RegGetValueW
RegGetValueA
CreateProcessAsUserA
OpenProcessToken
OpenThreadToken
AdjustTokenPrivileges
ImpersonateSelf
LookupPrivilegeValueA
CloseServiceHandle
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
RegisterServiceCtrlHandlerExA
SetServiceStatus
StartServiceCtrlDispatcherA
EventRegister
EventUnregister
EventWriteTransfer
RegCloseKey
RegOpenCurrentUser
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegSetValueExW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
WTSQueryUserToken
WTSEnumerateProcessesA
psapi
GetModuleBaseNameA
EnumProcessModules
userenv
UnloadUserProfile
LoadUserProfileA
powrprof
PowerWriteACValueIndex
PowerWriteDCValueIndex
PowerGetActiveScheme
PowerSetActiveScheme
PowerSettingAccessCheck
PowerReadACValueIndex
PowerReadDCValueIndex
PowerEnumerate
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
CM_Locate_DevNodeA
CM_Reenumerate_DevNode
SetupDiGetHwProfileList
SetupDiSetClassInstallParamsA
CM_Get_Device_ID_ExA
CM_Get_DevNode_Status
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
dwmapi
DwmIsCompositionEnabled
shlwapi
StrStrIA
kernel32
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
CreateFileW
SetConsoleCtrlHandler
GetProcessHeap
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
OutputDebugStringW
WideCharToMultiByte
GetConsoleMode
GetConsoleOutputCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
VirtualProtect
InitializeCriticalSectionEx
IsThreadAFiber
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetTempPathW
GetFileType
HeapAlloc
HeapSize
GetCommandLineW
FreeLibrary
GetProcAddress
SetDefaultDllDirectories
lstrcmpiA
WaitForSingleObject
GetSystemDirectoryA
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
WTSGetActiveConsoleSessionId
GetEnvironmentVariableA
GetFileAttributesA
CloseHandle
TerminateProcess
CreateProcessA
OpenProcess
QueryFullProcessImageNameA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetLastError
GetCurrentThread
GetModuleFileNameA
GetFirmwareEnvironmentVariableA
SetFirmwareEnvironmentVariableA
LoadLibraryExA
LoadLibraryA
FreeResource
LoadResource
LockResource
FindResourceExA
GetSystemDefaultLangID
OutputDebugStringA
GetLocalTime
VerSetConditionMask
DeleteFileA
FindClose
FindFirstFileA
RtlUnwind
RemoveDirectoryA
Sleep
GetWindowsDirectoryA
VerifyVersionInfoW
ReleaseMutex
CreateMutexA
OpenMutexA
SetEvent
ResetEvent
CreateEventA
OpenEventA
WaitForMultipleObjects
CreateThread
SetThreadPriority
TerminateThread
CreateFileA
FlushFileBuffers
ReadFile
WriteFile
ConnectNamedPipe
DisconnectNamedPipe
CreateNamedPipeA
LocalFree
GetCurrentProcess
GetCurrentProcessId
GetPackageFamilyName
ExpandEnvironmentStringsA
QueryPerformanceCounter
QueryPerformanceFrequency
DeviceIoControl
LocalAlloc
GetCommandLineA
HeapReAlloc
WriteConsoleW
SetEndOfFile
HeapFree
FindNextFileA
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
EncodePointer
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
Sections
.text Size: 473KB - Virtual size: 473KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
memcpy_ Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fptable Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_guard_c Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_guard_d Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE