C:\Users\kyrow\source\repos\0day\x64\Release\0day.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0day.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0day.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
0day.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral4
Sample
0day.exe
Resource
win11-20240221-en
General
-
Target
0day.exe
-
Size
38KB
-
MD5
81efd2da1b4299c9eb7ad9756a76d08d
-
SHA1
53c2aa9b0d01d39ba41ff7c35760432e24bf7270
-
SHA256
98a9ac2866e8bdb5f1635dd1efa2790f5f6c33279d396fee1cba54d8b79eb6a5
-
SHA512
b5748b2a8d870c51b239f9459708a6ea8bf29874b37d61d305f0ba3235c016547e7c5598349dba9e7f1f58e4ee68da4fc38cd57aff7fbf8f8cc1f7f95a161d46
-
SSDEEP
768:qmz4BQGFnKwSSRobUfjb4oA3xEcUFIcuPQ:/MZFnFowrb4oAueP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0day.exe
Files
-
0day.exe.exe windows:6 windows x64 arch:x64
Password: 123
f9a4210a38f0c96da3156b4c327d4e0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsDebuggerPresent
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
GetCurrentProcess
QueryPerformanceCounter
MultiByteToWideChar
user32
GetMessageW
TranslateMessage
SystemParametersInfoW
DispatchMessageW
shell32
ShellExecuteA
msvcp140
?good@ios_base@std@@QEBA_NXZ
?_Xlength_error@std@@YAXPEBD@Z
?uncaught_exceptions@std@@YAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
winmm
mciSendStringW
ntdll
NtRaiseHardError
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCaptureContext
RtlAdjustPrivilege
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memset
_CxxThrowException
__current_exception_context
__current_exception
__C_specific_handler
__std_exception_copy
__std_exception_destroy
__std_terminate
memcpy
memmove
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-heap-l1-1-0
free
_callnewh
_set_new_mode
malloc
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_c_exit
_seh_filter_exe
terminate
_cexit
__p___argv
_crt_atexit
_register_thread_local_exe_atexit_callback
__p___argc
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
exit
_invalid_parameter_noinfo_noreturn
_get_initial_narrow_environment
_exit
_initterm_e
_initterm
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ