C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x64\avDump.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe
Resource
win10v2004-20250217-en
General
-
Target
3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b
-
Size
3.4MB
-
MD5
9499d9ca6a96c11439dc4e116bfae2ec
-
SHA1
9e536f4faee5e196cce606db2a96a6d352953d99
-
SHA256
3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b
-
SHA512
09c34580b34549ce7750ce0862a7f2582e0f75c1492dc2eff5c18b51d87860bc79f285a2e72ffde622df9a4f1c04d4e974fd5e74995d1c6e891eaca2fc8186dc
-
SSDEEP
49152:102IVhuSr8IKwC6h1lgKlQAEijVvZek0jL2U0DITZOoJdlArtYtPtdJ+c1cTyyFH:2BhpFZsVZPl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b
Files
-
3a7b4f31f11884854c6eee060669d518aaba8a6ba311200aef7d775f3e38ea5b.exe windows:6 windows x64 arch:x64
d28dba14ffbd1cd5762ee22530823490
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
rpcrt4
UuidToStringW
Ndr64AsyncServerCallAll
NdrAsyncServerCall
Ndr64AsyncClientCall
NdrClientCall3
NdrServerCall2
UuidFromStringW
RpcAsyncInitializeHandle
RpcAsyncCompleteCall
RpcBindingToStringBindingW
RpcEpUnregister
UuidCreate
RpcBindingFree
I_RpcBindingInqLocalClientPID
RpcAsyncCancelCall
RpcStringBindingComposeW
RpcStringFreeW
RpcBindingFromStringBindingW
RpcEpRegisterW
RpcObjectSetType
RpcServerRegisterIf2
RpcServerUnregisterIfEx
RpcImpersonateClient
RpcRevertToSelf
RpcMgmtEpEltInqNextW
RpcMgmtEpEltInqBegin
RpcIfInqId
RpcMgmtEpEltInqDone
RpcServerUseProtseqEpW
RpcServerRegisterIfEx
RpcServerUnregisterIf
NdrServerCallAll
RpcStringBindingParseW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
shell32
ord165
SHGetFolderPathW
ntdll
RtlPcToFileHeader
RtlUnwindEx
VerSetConditionMask
RtlNtStatusToDosError
RtlVirtualUnwind
NtQueryKey
NtClose
NtOpenKey
NtSetInformationThread
RtlCaptureContext
NtDeleteKey
RtlLookupFunctionEntry
NtSystemDebugControl
RtlDllShutdownInProgress
RtlUnwind
kernel32
GetModuleHandleExW
GetCurrentThreadId
Sleep
LocalFree
SetFilePointerEx
UnlockFileEx
LockFileEx
GetFileSizeEx
ReadFile
CompareStringW
GetCurrentProcess
GetCurrentThread
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetThreadId
CreateProcessW
WriteFile
GetExitCodeProcess
ResumeThread
GetPriorityClass
GetProcessTimes
K32GetProcessMemoryInfo
InitializeCriticalSectionEx
LoadLibraryW
CompareFileTime
QueryFullProcessImageNameW
FlushFileBuffers
DeleteFileW
GetFileInformationByHandle
GetFullPathNameW
OutputDebugStringA
FileTimeToSystemTime
GetCurrentProcessId
TlsAlloc
TlsGetValue
TlsSetValue
FreeLibrary
ResetEvent
GetSystemInfo
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
GetThreadTimes
ExpandEnvironmentStringsW
GetFileAttributesW
LoadLibraryExW
GetSystemDirectoryW
SetErrorMode
GetModuleFileNameA
VirtualProtect
HeapReAlloc
GlobalMemoryStatusEx
SetThreadPriority
GetThreadPriority
TerminateThread
GetExitCodeThread
TlsFree
SetFilePointer
SetEndOfFile
MoveFileExW
GetWindowsDirectoryW
DuplicateHandle
FindFirstFileW
FindClose
CreateDirectoryW
FindFirstFileExW
FindNextFileW
QueryDosDeviceW
GetEnvironmentVariableW
SetFileInformationByHandle
GetDiskFreeSpaceExW
K32GetMappedFileNameW
FindFirstVolumeW
FindNextVolumeW
GetVolumePathNamesForVolumeNameW
FindVolumeClose
VirtualQuery
GetSystemTimes
GetTickCount64
RaiseException
FlsAlloc
GetFileType
ExitProcess
GetCommandLineW
GetCommandLineA
GetStdHandle
FreeLibraryAndExitThread
ExitThread
InitializeCriticalSectionAndSpinCount
InterlockedPushEntrySList
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetLastError
HeapFree
GetProcessHeap
RegisterWaitForSingleObject
HeapAlloc
GetModuleFileNameW
VerifyVersionInfoW
SetConsoleCtrlHandler
SetDllDirectoryW
GetProcAddress
GetModuleHandleW
WaitForSingleObject
GetProcessId
GetNamedPipeServerProcessId
GetFileTime
MultiByteToWideChar
ContinueDebugEvent
DebugActiveProcessStop
GetFileAttributesExW
GetSystemTimeAsFileTime
ReadProcessMemory
OpenThread
DebugBreakProcess
CreateFileW
DeviceIoControl
SetEvent
WaitForDebugEvent
DebugSetProcessKillOnExit
DebugActiveProcess
WideCharToMultiByte
VirtualQueryEx
GetThreadContext
K32GetProcessImageFileNameW
K32GetModuleBaseNameW
K32EnumProcessModules
OpenProcess
WaitForMultipleObjects
GetLastError
CreateEventW
CloseHandle
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
OutputDebugStringW
SetStdHandle
HeapSize
WriteConsoleW
QueryUnbiasedInterruptTime
CancelIoEx
GetOverlappedResult
ReadDirectoryChangesW
UnregisterWaitEx
ProcessIdToSessionId
QueryThreadCycleTime
WaitForThreadpoolWaitCallbacks
ReleaseSRWLockShared
AcquireSRWLockShared
UnhandledExceptionFilter
GetCPInfo
CloseThreadpoolWait
SetThreadpoolWait
CreateThreadpoolWait
LCMapStringEx
DecodePointer
EncodePointer
GetLocaleInfoEx
InitOnceComplete
InitOnceBeginInitialize
TryAcquireSRWLockExclusive
AcquireSRWLockExclusive
LoadLibraryExA
SetUnhandledExceptionFilter
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
K32GetPerformanceInfo
CheckRemoteDebuggerPresent
FlushInstructionCache
K32EnumProcesses
GetProcessHandleCount
TerminateProcess
SetEnvironmentVariableW
CreateThread
GetNativeSystemInfo
WaitForSingleObjectEx
FormatMessageA
GetStringTypeW
AreFileApisANSI
GetFileInformationByHandleEx
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
ReleaseSRWLockExclusive
user32
GetSystemMetrics
RegisterClassExW
GetClassInfoExW
SetWindowLongPtrW
SendMessageW
RegisterWindowMessageW
LoadStringW
GetGUIThreadInfo
SendMessageCallbackW
IsHungAppWindow
PeekMessageW
PostMessageW
advapi32
QueryServiceConfig2W
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
RegQueryMultipleValuesW
RegDeleteTreeW
RegNotifyChangeKeyValue
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryInfoKeyW
RegDeleteValueW
RegEnumValueW
RegEnumKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
FreeSid
EqualSid
GetTokenInformation
CheckTokenMembership
DuplicateToken
RegOpenKeyExW
StartServiceW
QueryServiceStatus
AllocateAndInitializeSid
RevertToSelf
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
CloseServiceHandle
ControlService
ChangeServiceConfigW
CreateServiceW
DeleteService
OpenServiceW
OpenSCManagerW
StartServiceCtrlDispatcherW
ChangeServiceConfig2W
RegisterServiceCtrlHandlerExW
SetServiceStatus
SetThreadToken
powrprof
CallNtPowerInformation
shlwapi
PathAppendW
PathRemoveFileSpecW
PathFindFileNameW
ole32
CoCreateGuid
Exports
Exports
asw_process_storage_allocate_connector
asw_process_storage_deallocate_connector
on_avast_dll_unload
onexit_register_connector_avast_2
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 745KB - Virtual size: 745KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 397KB - Virtual size: 430KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.didat Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ