C:\Users\Administrator\Desktop\tool_scan_via_2024\KToolsAll Get Cookie - Check Pass - Recover Cookie - Ver4.1\obj\Debug\KToolsAll Get Cookie - Check Pass - Recover Cookie - Ver4.1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7a3e0dc2f82fb9a3ebd15b59dd972c1a8c6f261729b9cf1695e694d352cb095d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a3e0dc2f82fb9a3ebd15b59dd972c1a8c6f261729b9cf1695e694d352cb095d.exe
Resource
win10v2004-20240226-en
General
-
Target
7a3e0dc2f82fb9a3ebd15b59dd972c1a8c6f261729b9cf1695e694d352cb095d.exe
-
Size
537KB
-
MD5
3d96e5cbb1fc1bfa56b1f6a31635389e
-
SHA1
72a6491cf83c954f7c367079dfd8926afef815cf
-
SHA256
7a3e0dc2f82fb9a3ebd15b59dd972c1a8c6f261729b9cf1695e694d352cb095d
-
SHA512
6f312ec5229edfa6f2e032e9420fbb6e4e023c9916e0b9a15c932417cd6df12db1846adec78bba63b47e7af517334d00367b89640219d1457a367060745e5ac2
-
SSDEEP
6144:WmEJRTWsKxA9bkCAitROyCQeobqUxOyCQeob:UwppivObaOb
Malware Config
Signatures
-
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a3e0dc2f82fb9a3ebd15b59dd972c1a8c6f261729b9cf1695e694d352cb095d.exe
Files
-
7a3e0dc2f82fb9a3ebd15b59dd972c1a8c6f261729b9cf1695e694d352cb095d.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 489KB - Virtual size: 488KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ