D:\UserData\Arbeit\Visual Studio\GitHub\NSudo\Source\Native\Output\Binaries\Release\x64\NSudoLG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9dd3aa48fac3bc664777957b312b018c765cae685f5a76d7a9c61f342421aa55.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9dd3aa48fac3bc664777957b312b018c765cae685f5a76d7a9c61f342421aa55.exe
Resource
win10v2004-20231222-en
General
-
Target
9dd3aa48fac3bc664777957b312b018c765cae685f5a76d7a9c61f342421aa55
-
Size
180KB
-
MD5
8ea21d86ee4c9d9fadefa0a7b6b3ba1e
-
SHA1
1467a07db0cd1aa0e59541bd1dd521a8e4c941ec
-
SHA256
9dd3aa48fac3bc664777957b312b018c765cae685f5a76d7a9c61f342421aa55
-
SHA512
d3e57e08a650dfd72c2798d3b7e59834859c5229e9ec2b2c8cd997df13bc266138e791195f4aa4e96d0a15dc3b155bb6547420cc799b2396c6f2e814bb49a40d
-
SSDEEP
3072:yJhr/mteLgGEY1L+nePdm0rniF2iPM8lEuA6N3lq:yXr/mteL9EnePBniF2MyuA6H
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9dd3aa48fac3bc664777957b312b018c765cae685f5a76d7a9c61f342421aa55
Files
-
9dd3aa48fac3bc664777957b312b018c765cae685f5a76d7a9c61f342421aa55.exe windows:6 windows x64 arch:x64
e94476bd260b8e4e3e61cac091331715
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
ExpandEnvironmentStringsW
GetModuleFileNameW
OpenProcess
MultiByteToWideChar
GetTickCount64
LockResource
QueryPerformanceFrequency
FindResourceExW
LoadResource
GetProcAddress
VerSetConditionMask
FreeLibrary
SleepEx
GetFileInformationByHandleEx
QueryPerformanceCounter
LoadLibraryExW
GetModuleHandleExW
ExitProcess
Sleep
VirtualQuery
RtlUnwindEx
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetStartupInfoW
IsDebuggerPresent
SizeofResource
GetLocalTime
GetCurrentProcessId
ResumeThread
WaitForSingleObjectEx
InitializeCriticalSection
GetCurrentProcess
SetPriorityClass
MulDiv
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
CloseHandle
GetThreadUILanguage
GetLastError
GetCurrentThreadId
GetFileAttributesW
CreateFileW
InitializeCriticalSectionEx
LeaveCriticalSection
SetThreadUILanguage
GetCommandLineW
EnterCriticalSection
SetLastError
HeapFree
VerifyVersionInfoW
ReadFile
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
user32
LoadImageW
SetWindowTextW
EndDialog
SendMessageW
GetWindowTextW
EndPaint
BeginPaint
DrawIconEx
GetClientRect
LoadIconW
ChangeWindowMessageFilter
DestroyIcon
UnregisterClassW
SetWindowLongPtrW
MonitorFromWindow
GetDC
DialogBoxParamW
GetDlgItem
gdi32
DeleteDC
GetDeviceCaps
comdlg32
GetOpenFileNameW
advapi32
AdjustTokenPrivileges
GetAce
CloseServiceHandle
OpenSCManagerW
AllocateAndInitializeSid
IsWellKnownSid
AddAce
CreateRestrictedToken
FreeSid
StartServiceW
InitializeAcl
OpenServiceW
GetLengthSid
AddAccessAllowedAce
QueryServiceStatusEx
LookupPrivilegeValueW
SetTokenInformation
OpenProcessToken
SetThreadToken
CreateProcessAsUserW
DuplicateTokenEx
GetTokenInformation
shell32
DragQueryFileW
DragFinish
ole32
CoInitializeEx
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
wtsapi32
WTSEnumerateProcessesW
WTSQueryUserToken
WTSEnumerateSessionsW
WTSFreeMemory
msvcrt
strcpy_s
__pctype_func
tolower
___mb_cur_max_func
wcsnlen
wcstol
_mbtowc_l
?terminate@@YAXXZ
__wgetmainargs
_msize
_XcptFilter
__set_app_type
_errno
_wcmdln
?_set_new_mode@@YAHH@Z
_commode
___lc_codepage_func
realloc
ceil
log10
_clearfp
_set_fmode
_initterm_e
_initterm
_callnewh
_wcsnicmp
__CxxFrameHandler3
memcpy
malloc
free
strncmp
_wcsicmp
strrchr
_local_unwind
__DestructExceptionObject
_amsg_exit
memmove
memset
__C_specific_handler
_CxxThrowException
wcsstr
wcsrchr
abort
memcmp
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ