C:\Users\AW\Desktop\rootkit\vs\Release\Uninstall.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a500a09efc3f9f630ec7ef93dfb32af9c47031a5df0ef0b97a1d371431aa12a3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a500a09efc3f9f630ec7ef93dfb32af9c47031a5df0ef0b97a1d371431aa12a3.exe
Resource
win10v2004-20241007-en
General
-
Target
a500a09efc3f9f630ec7ef93dfb32af9c47031a5df0ef0b97a1d371431aa12a3
-
Size
173KB
-
MD5
7b1045abb936796260677aa7074a5501
-
SHA1
bab4523974bd18bb4e7521ff2cf2d6ae179d9dfe
-
SHA256
a500a09efc3f9f630ec7ef93dfb32af9c47031a5df0ef0b97a1d371431aa12a3
-
SHA512
172406c88d5a112186cdce1591bfbcc0e8449b8995d629731cadb52eddc51f92eaf299d6c97841678be1eddc0637c16fa74d255bfb4419e22045f96416057c39
-
SSDEEP
3072:2PHTPZNVzbfUL7ffFu73seERTJqv4cHuWzfePpoZi2p6tu6GMqgggUb/v5n:4BvK7fnqv7uI4oZifUT5n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a500a09efc3f9f630ec7ef93dfb32af9c47031a5df0ef0b97a1d371431aa12a3
Files
-
a500a09efc3f9f630ec7ef93dfb32af9c47031a5df0ef0b97a1d371431aa12a3.exe windows:6 windows x86 arch:x86
855d9cd187ec2ebc1985a53882f49996
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LockResource
DeleteFileW
CloseHandle
LoadResource
K32EnumProcesses
GetProcAddress
ReadProcessMemory
GetCurrentProcessId
lstrcatW
GetModuleHandleW
FreeLibrary
WideCharToMultiByte
K32EnumProcessModules
IsWow64Process
WriteConsoleW
GetLastError
Sleep
OpenProcess
GetModuleHandleA
CreateFileW
WaitForSingleObject
FindResourceA
GetTempPathW
TerminateProcess
WriteFile
GetCurrentProcess
SizeofResource
CreateProcessW
SetFilePointerEx
DecodePointer
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
LCMapStringW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
advapi32
RegDeleteValueW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
RegDeleteKeyExW
RegDeleteKeyW
RegEnumKeyExW
OpenProcessToken
RegOpenKeyExW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
shlwapi
PathCombineW
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ