D:\a\modlunky2\modlunky2\target\release\deps\modlunky2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
modlunky2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
modlunky2.exe
Resource
win10v2004-20240221-en
General
-
Target
modlunky2.exe
-
Size
21.5MB
-
MD5
f1f95d1956108f0405387920818a49ff
-
SHA1
b2691b2bc527adbf94a17604b34ff0e026245196
-
SHA256
d5db5bca4d882977b39eb857ed212a37b99eeff88e6ef26c521ceddf482cf1b6
-
SHA512
026b9f059312aed39973e24e99326dccd77bed7f4e7907a4bf1bd25be073d9d8a9b8c6722342ed894b8805e765668dbea7518d34943b3763520c952d0fcc54ab
-
SSDEEP
393216:j7IRayVFX+8Po9VXqSdZ++mpej6WpKUv8kR+cxRJbFNfmw62KYgFxdvyb1:Q7PiV6SXq+5NfPbfntKt1vq1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource modlunky2.exe
Files
-
modlunky2.exe.exe windows:6 windows x64 arch:x64
6cdbf0b80f3d5292b9b5a6b0b0650374
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
WriteFileEx
SleepEx
ReadFileEx
WaitForSingleObject
TerminateProcess
TryAcquireSRWLockExclusive
HeapAlloc
GetProcessHeap
HeapFree
GetEnvironmentVariableW
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetModuleHandleA
FindNextFileW
GetEnvironmentStringsW
GetFileInformationByHandle
GetFileInformationByHandleEx
GetCurrentDirectoryW
GetStdHandle
CreateDirectoryW
FindFirstFileW
GetCommandLineW
SetLastError
GetFileType
RtlLookupFunctionEntry
GetProcAddress
RtlCaptureContext
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
ExitProcess
GetFullPathNameW
RtlVirtualUnwind
CreateNamedPipeW
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
GetCurrentThread
MultiByteToWideChar
WriteConsoleW
CreateThread
GetSystemTimeAsFileTime
GetCurrentProcess
AcquireSRWLockExclusive
QueryPerformanceCounter
SwitchToThread
SetThreadStackGuarantee
AddVectoredExceptionHandler
GetLastError
CompareStringOrdinal
ReleaseSRWLockShared
DeleteProcThreadAttributeList
FindClose
ReleaseMutex
UnhandledExceptionFilter
FreeEnvironmentStringsW
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentThreadId
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
SetFileInformationByHandle
SetConsoleMode
GetConsoleMode
ReleaseSRWLockExclusive
DuplicateHandle
GetCurrentProcessId
lstrlenW
InitializeSListHead
IsDebuggerPresent
CreateFileW
CloseHandle
shell32
SHGetKnownFolderPath
ole32
CoTaskMemFree
advapi32
SystemFunction036
ntdll
NtCreateFile
RtlNtStatusToDosError
NtWriteFile
NtReadFile
bcrypt
BCryptGenRandom
vcruntime140
_CxxThrowException
__C_specific_handler
__CxxFrameHandler3
memcpy
memcmp
memset
memmove
__current_exception_context
__current_exception
api-ms-win-crt-string-l1-1-0
strlen
api-ms-win-crt-heap-l1-1-0
free
malloc
_set_new_mode
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-runtime-l1-1-0
exit
_exit
__p___argc
__p___argv
_cexit
_get_initial_narrow_environment
_c_exit
_register_thread_local_exe_atexit_callback
_initialize_narrow_environment
_configure_narrow_argv
_initialize_onexit_table
_register_onexit_function
_seh_filter_exe
_crt_atexit
terminate
_set_app_type
_initterm
_initterm_e
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20.4MB - Virtual size: 20.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ