rdshost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ec1a1baf23225c897f846d8e55e7d2e76404324f00c5b1673702aff85ae883f9.exe
Resource
win7-20241010-en
General
-
Target
ec1a1baf23225c897f846d8e55e7d2e76404324f00c5b1673702aff85ae883f9.exe
-
Size
653KB
-
MD5
1559eba1084a34643e6456d416478ca0
-
SHA1
b6bef8dd97c615df23733745fa02986ffcb60e34
-
SHA256
ec1a1baf23225c897f846d8e55e7d2e76404324f00c5b1673702aff85ae883f9
-
SHA512
bfc027e4d82f1958d552837b2ac5a5f75b4ab9d77095c60a9c5f4eb0730dd6a38a56e9dcd834ba073037a08675bffdfc3bc22c9dce61666cd454d060a647cada
-
SSDEEP
12288:JTYkuB+NC7dTWJ3s0gKhdQw66zqHR7L3jwAS+QWE3PfQy75alnnEX7nuoK6HQDX3:JsB+Nytop966zqR7jUAFQWeXQy70yTPK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec1a1baf23225c897f846d8e55e7d2e76404324f00c5b1673702aff85ae883f9.exe
Files
-
ec1a1baf23225c897f846d8e55e7d2e76404324f00c5b1673702aff85ae883f9.exe.exe windows:5 windows x86 arch:x86
0ea6889cceb05f6e6c36cf5a3bed4897
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
_c_exit
_exit
_XcptFilter
_cexit
exit
wcscmp
__wgetmainargs
_controlfp
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__CxxFrameHandler
_CxxThrowException
??2@YAPAXI@Z
realloc
free
malloc
_purecall
_wcmdln
wcslen
wcstok
_wtoi
_wtol
wcschr
_initterm
??3@YAXPAX@Z
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
advapi32
FreeSid
LookupAccountNameW
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorDacl
OpenThreadToken
EqualSid
AllocateAndInitializeSid
OpenProcessToken
RegEnumKeyExW
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSid
GetLengthSid
CopySid
InitializeSecurityDescriptor
RegEnumValueW
RegQueryInfoKeyW
ConvertSidToStringSidW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
kernel32
WriteFile
ReadFile
SetLastError
CreateNamedPipeW
LocalFree
WideCharToMultiByte
GetACP
LocalAlloc
ProcessIdToSessionId
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoW
ConnectNamedPipe
EnterCriticalSection
MultiByteToWideChar
lstrlenW
lstrcpyW
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
SetEvent
CloseHandle
WaitForSingleObject
lstrcmpiW
lstrcpynW
HeapDestroy
lstrcatW
GetModuleFileNameW
GetLastError
CreateThread
CreateEventW
FreeLibrary
GetProcAddress
LoadLibraryW
GetCurrentProcess
GetCurrentThread
lstrlenA
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetShortPathNameW
Sleep
GetCurrentThreadId
GetCommandLineW
LeaveCriticalSection
GetOverlappedResult
DisconnectNamedPipe
ResetEvent
FlushFileBuffers
user32
PostThreadMessageW
DispatchMessageW
GetMessageW
wsprintfW
CharNextW
winsta
WinStationConnectCallback
ole32
CoImpersonateClient
CoRevertToSelf
CoSetProxyBlanket
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoRegisterClassObject
CoRevokeClassObject
oleaut32
SysFreeString
SysAllocString
VarUI4FromStr
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringLen
SysAllocStringLen
VariantClear
SysAllocStringByteLen
SysStringByteLen
wsock32
htons
ioctlsocket
gethostbyname
WSAStartup
WSACleanup
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 600KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE