C:\Users\Rob\Desktop\Crypter\2011-04-17-A\2011-04-17-A\Debug\Loader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
99c30d24b12dbda1a535136fa4bc88d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99c30d24b12dbda1a535136fa4bc88d0.exe
Resource
win10v2004-20231222-en
General
-
Target
99c30d24b12dbda1a535136fa4bc88d0
-
Size
621KB
-
MD5
99c30d24b12dbda1a535136fa4bc88d0
-
SHA1
eb3c9d58391bc78ea0a7ac303d48833b87f473c9
-
SHA256
b60cdd0a63d690fc44d78a60066fa6c8af7c978b54277ac8930df7316c17b6bf
-
SHA512
9369fceb49cdcd441508f0e6870a1aa1f4532f7040d8588d5c0dfe0be5be10e3b04755ae86ec67d5b76a2433c27c2a74d539aa029eb2c21b3447420fde7ae87a
-
SSDEEP
12288:IeQAHQ2MvY4tHDkb46vl6DJ4E7xJr61kfgjdkAmpqZXy64bv:lQAHQ2CYrJvlEvtPgjTeqZ6v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 99c30d24b12dbda1a535136fa4bc88d0
Files
-
99c30d24b12dbda1a535136fa4bc88d0.exe windows:5 windows x86 arch:x86
68b7e7188720561a03084fa1952e52a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FreeResource
GlobalAlloc
GlobalFree
CloseHandle
ReadFile
GetFileSize
CreateFileA
LoadLibraryA
GetModuleHandleA
VirtualAlloc
GetProcAddress
IsBadReadPtr
VirtualProtect
VirtualFree
WaitForSingleObject
CreateThread
GetCommandLineA
GetStartupInfoA
IsDebuggerPresent
RaiseException
DebugBreak
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
HeapValidate
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetLastError
GetCurrentThread
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
WriteFile
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
InitializeCriticalSectionAndSpinCount
HeapSize
HeapReAlloc
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
InterlockedExchange
GetTimeZoneInformation
GetLocaleInfoW
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
Sections
.textbss Size: - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ