Static task
static1
Behavioral task
behavioral1
Sample
debug.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
debug.exe
Resource
win10v2004-20231023-en
General
-
Target
debug.exe
-
Size
10KB
-
MD5
af34e869872ddc4ae0d1501da4fc2e56
-
SHA1
f61c90bce6097f3490984a68a407ae48fa30ebd5
-
SHA256
6dca497b5bd40c8034ba4f1331028051d211a3198d9b17d811d5c43727ecf0a3
-
SHA512
52820bd04eed28b0e7cfae6792064de109c6fa863afd5bc7dd88e82a2ffe126856465f1e83820f239a02a71841eb0f8d9c6221d281bd9d3e87a2c191b76f3bd5
-
SSDEEP
96:0oSqKogUv8KwUPKSpVIUMBESAzo/xXSVihKpixkZc:0on6SGBvpdSViFxk6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource debug.exe
Files
-
debug.exe.exe windows:4 windows x64
b4c6fff030479aa3b12625be67bf4914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
ExitProcess
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ghyr Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE