C:\Users\Omega\Desktop\39666\Exploit\Release\Exploit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
294c5f2aee5ad5712ed356dff51006b0182fa4a4b4f4b0160c0b3aa7af575cc7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
294c5f2aee5ad5712ed356dff51006b0182fa4a4b4f4b0160c0b3aa7af575cc7.exe
Resource
win10v2004-20240226-en
General
-
Target
294c5f2aee5ad5712ed356dff51006b0182fa4a4b4f4b0160c0b3aa7af575cc7
-
Size
8KB
-
MD5
a323d295d71b16ff40d974807255498a
-
SHA1
7a0d919b0042df88b4a261c951e1d2d97973c37a
-
SHA256
294c5f2aee5ad5712ed356dff51006b0182fa4a4b4f4b0160c0b3aa7af575cc7
-
SHA512
db9b6a97a4c37aed4ae86c4a6684d70dc9bad18f0df77f779158926d8678424b64d0623e22a426e7545655b94395929226af8c7060625c83d7bc321fa87d7329
-
SSDEEP
192:Pr9UDKgrS8/Z9mbJxuMfiOKd3+y2xtA39Q:PKKnsmNJRbxt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 294c5f2aee5ad5712ed356dff51006b0182fa4a4b4f4b0160c0b3aa7af575cc7
Files
-
294c5f2aee5ad5712ed356dff51006b0182fa4a4b4f4b0160c0b3aa7af575cc7.exe windows:6 windows x86 arch:x86
f3d0c0626ef299dced4a22c1369da5de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetProcAddress
GetCurrentProcess
GetModuleHandleW
GetCurrentThreadId
DecodePointer
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
IsDebuggerPresent
EncodePointer
user32
DestroyWindow
TrackPopupMenu
SetWindowsHookExA
DestroyMenu
InsertMenuItemA
CreatePopupMenu
CreateWindowExA
RegisterClassA
DefWindowProcW
PostMessageA
CallNextHookEx
SetWindowLongA
UnhookWindowsHook
EndMenu
msvcr120
_except_handler4_common
_controlfp_s
_invoke_watson
_onexit
__dllonexit
_calloc_crt
_unlock
_lock
printf
system
_XcptFilter
_amsg_exit
__wgetmainargs
__set_app_type
exit
_exit
_cexit
_configthreadlocale
__setusermatherr
_initterm_e
_initterm
__winitenv
_fmode
_commode
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
?terminate@@YAXXZ
__crtSetUnhandledExceptionFilter
memset
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ