C:\Users\yocin\source\repos\Exam1\Release\Exam1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
sample4_006C0000_dump.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
sample4_006C0000_dump.exe
Resource
win10v2004-20231215-en
General
-
Target
sample4_006C0000_dump.7z
-
Size
11KB
-
MD5
c2d64a607b0296f1f0365850c4b9867d
-
SHA1
e3bc00b73f477e06ed1fa337ce4eb1432757eb74
-
SHA256
ef57e7af98934160a311b616b62784c11cb38c9daf62307d37ca5dd14fe28b67
-
SHA512
89d985d9e7d47fc408cbda4b33886396f212b1fdedbe6ed89ebe63f7202e8d20d3baa95fbc292d468c1dd3aa82ae73a316ffe71ebacd4d2b449180e7025861fa
-
SSDEEP
192:V4itZwWm7Lu7ViMiZisKoi+dlkPQfhS9ukRUmXl7c2VykXxX9eM05QR:yirigqi+nfhnkRUmVTVBX9epC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/sample4_006C0000_dump.bin
Files
-
sample4_006C0000_dump.7z.7z
Password: infected
-
sample4_006C0000_dump.bin.exe windows:6 windows x86 arch:x86
Password: infected
7fc39fa1286bec03fdcb71e79aea4490
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessW
CloseHandle
GetExitCodeProcess
SetUnhandledExceptionFilter
GetLastError
Sleep
WaitForSingleObject
PeekNamedPipe
CreatePipe
SetHandleInformation
GetModuleFileNameA
ReadFile
GetComputerNameA
GetStartupInfoW
GetCurrentProcess
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
IsDebuggerPresent
advapi32
CryptDestroyKey
CryptAcquireContextW
CryptEncrypt
CryptDecrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
CryptDestroyHash
CryptReleaseContext
msvcp140
?_Xlength_error@std@@YAXPBD@Z
wininet
InternetReadFile
HttpOpenRequestW
InternetOpenW
HttpQueryInfoW
HttpSendRequestW
InternetCloseHandle
InternetConnectW
vcruntime140
_CxxThrowException
__current_exception
__current_exception_context
memset
__CxxFrameHandler3
memchr
memcpy
__std_exception_copy
_except_handler4_common
__std_exception_destroy
memmove
api-ms-win-crt-string-l1-1-0
isalnum
api-ms-win-crt-runtime-l1-1-0
_exit
__p___argc
__p___argv
_c_exit
_initterm
exit
_seh_filter_exe
_configure_narrow_argv
terminate
_controlfp_s
_initialize_narrow_environment
_initialize_onexit_table
_set_app_type
_get_initial_narrow_environment
_initterm_e
_register_thread_local_exe_atexit_callback
_register_onexit_function
_crt_atexit
_invalid_parameter_noinfo_noreturn
_cexit
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
__stdio_common_vfprintf
__p__commode
_set_fmode
__stdio_common_vswprintf_s
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
_set_new_mode
free
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ