C:\dev\projs\processsupervisor\output\TweakScheduler.pdb
Static task
static1
Behavioral task
behavioral1
Sample
00d2296ce9ef1efcc7441fec0270afed396ff7adef4efe7cef2305d9428db37c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00d2296ce9ef1efcc7441fec0270afed396ff7adef4efe7cef2305d9428db37c.exe
Resource
win10v2004-20241007-en
General
-
Target
00d2296ce9ef1efcc7441fec0270afed396ff7adef4efe7cef2305d9428db37c
-
Size
582KB
-
MD5
cc234b9b76b1f777acd9192a656adccd
-
SHA1
132702f593c8ef7919a37e225c3a94910a15a981
-
SHA256
00d2296ce9ef1efcc7441fec0270afed396ff7adef4efe7cef2305d9428db37c
-
SHA512
c4d535defa1fd7965af37acdc30aba880d84d53ed352c93bd38b4f58d81dfcb9fc7146a3093bbbe3106b3bdf32918b42f8a957324ae75d18442c672958d360ee
-
SSDEEP
6144:zTdyMH25ifCghTm+nQVNqNqelrrBJJ1K04vMoMMfA3TYBu2muGKa13rGcB3:QmzFnV8elrrarrtBu2m1KcB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00d2296ce9ef1efcc7441fec0270afed396ff7adef4efe7cef2305d9428db37c
Files
-
00d2296ce9ef1efcc7441fec0270afed396ff7adef4efe7cef2305d9428db37c.exe windows:6 windows x86 arch:x86
563e03ecc43ce20abd7bf518220d7f16
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
kernel32
GetActiveProcessorGroupCount
GetNumaHighestNodeNumber
OutputDebugStringW
GetVersionExW
GetCurrentProcess
GetExitCodeProcess
GetFileTime
GetSystemTimeAsFileTime
CloseHandle
MultiByteToWideChar
GetFileAttributesW
CreateFileW
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
ExitProcess
LoadLibraryW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
FindResourceExW
GetSystemInfo
HeapReAlloc
LockResource
GetLastError
HeapSize
InitializeCriticalSectionEx
GetLogicalProcessorInformationEx
HeapFree
IsBadWritePtr
SizeofResource
GetActiveProcessorCount
WriteConsoleW
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FreeLibrary
GetUserDefaultUILanguage
VerSetConditionMask
CreateDirectoryW
DeleteFileW
GetFileSize
GetLongPathNameW
GetShortPathNameW
RemoveDirectoryW
GetVolumeNameForVolumeMountPointW
SetLastError
OpenEventW
GetCurrentProcessId
CreateProcessW
GetStartupInfoW
ProcessIdToSessionId
OpenProcess
GetSystemDirectoryW
GetSystemWow64DirectoryW
GetModuleFileNameW
GetProcAddress
GlobalAlloc
GlobalUnlock
GlobalLock
LocalFree
WinExec
FormatMessageW
CopyFileW
MoveFileW
VerifyVersionInfoW
WideCharToMultiByte
ReadFile
GetHandleInformation
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
WaitForMultipleObjects
Sleep
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
InitializeSListHead
RaiseException
TryAcquireSRWLockExclusive
QueryPerformanceFrequency
FormatMessageA
SetFileInformationByHandle
GetTempPathW
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetFileInformationByHandleEx
CreateSymbolicLinkW
GetLocaleInfoEx
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetCurrentThread
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetConsoleCtrlHandler
SetStdHandle
GetStringTypeW
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
user32
GetWindowRect
ScreenToClient
GetWindowLongW
SetWindowLongW
FindWindowW
GetWindowThreadProcessId
GetIconInfo
GetSystemMetrics
GetWindowTextW
LoadStringW
MessageBoxW
GetDlgItem
InvalidateRect
SetWindowPos
GetDC
EmptyClipboard
SetClipboardData
GetDlgItemTextW
UnregisterClassW
CloseClipboard
OpenClipboard
PostMessageW
EndDialog
SetWindowTextW
ShowWindow
wvsprintfW
ExitWindowsEx
SetDlgItemTextW
IsDlgButtonChecked
CheckDlgButton
DialogBoxParamW
EnableWindow
CreateWindowExW
SendMessageW
GetClientRect
ReleaseDC
advapi32
OpenProcessToken
QueryServiceStatus
ConvertStringSidToSidW
QueryServiceConfigW
OpenServiceW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
CreateProcessAsUserW
DuplicateTokenEx
GetLengthSid
GetSidSubAuthority
GetSidSubAuthorityCount
OpenSCManagerW
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCloseKey
RegSetValueExW
StartServiceW
RegOpenKeyExW
RegQueryValueExW
GetTokenInformation
SetTokenInformation
GetUserNameW
RegEnumKeyW
RegEnumValueW
ChangeServiceConfigW
CloseServiceHandle
ControlService
EnumServicesStatusExW
NotifyBootConfigStatus
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ShellExecuteW
SHGetKnownFolderPath
SHChangeNotify
SHGetStockIconInfo
SHCreateDirectoryExW
ole32
CLSIDFromString
CoTaskMemFree
oleaut32
SysFreeString
SysAllocString
wininet
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetCanonicalizeUrlW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
shlwapi
SHDeleteKeyW
gdi32
GetTextExtentPoint32W
SelectObject
GetObjectW
DeleteObject
Sections
.text Size: 468KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ