D:\EKh\CS\Venoma\x64\Release\Venoma.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2b13065015caea59157a40cb42d03d513c0a2b20408e446eebf76334e000c0a4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b13065015caea59157a40cb42d03d513c0a2b20408e446eebf76334e000c0a4.exe
Resource
win10v2004-20240226-en
General
-
Target
2b13065015caea59157a40cb42d03d513c0a2b20408e446eebf76334e000c0a4
-
Size
381KB
-
MD5
a01f137648ad69f88a88335e9e93e6a3
-
SHA1
13136fdd5f10101449b99d963d6d10bddc0379da
-
SHA256
2b13065015caea59157a40cb42d03d513c0a2b20408e446eebf76334e000c0a4
-
SHA512
436866bfea9d34482b3fdd72617fbbec289b25f9d081f9773b4e25b116c6d2136e53ee40acb968d3a1c9e38eba42e86d890081bffba1b0dc58512bc485ba1c8a
-
SSDEEP
192:O+/pr3f/TKg8m9Zl5JBo6LelBkFoiZZtHTMKJ3k0y3Q5XfDcLx7EWR:O+/pr3TK/unPBo0SCfL3k0y3px7EW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b13065015caea59157a40cb42d03d513c0a2b20408e446eebf76334e000c0a4
Files
-
2b13065015caea59157a40cb42d03d513c0a2b20408e446eebf76334e000c0a4.exe windows:6 windows x64 arch:x64
d1e70702c3572dd6f65dcfecb5ab4acc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
MultiByteToWideChar
UpdateProcThreadAttribute
Process32NextW
SetFileInformationByHandle
Process32FirstW
CreateToolhelp32Snapshot
HeapAlloc
GetProcessHeap
CreateProcessA
lstrcmpiW
RtlLookupFunctionEntry
OpenProcess
CreateFileW
InitializeProcThreadAttributeList
GetModuleFileNameW
lstrlenW
GetCurrentProcess
HeapFree
CloseHandle
RtlVirtualUnwind
UnhandledExceptionFilter
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
TerminateProcess
RtlCaptureContext
vcruntime140
__current_exception_context
__std_exception_copy
__std_exception_destroy
memcpy
__C_specific_handler
__current_exception
_CxxThrowException
memset
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfwprintf
__p__commode
__stdio_common_vfprintf
__acrt_iob_func
_set_fmode
api-ms-win-crt-string-l1-1-0
tolower
_wcsicmp
api-ms-win-crt-runtime-l1-1-0
__p___argc
_get_initial_narrow_environment
_initterm
_initialize_onexit_table
_register_thread_local_exe_atexit_callback
_crt_atexit
terminate
_initialize_narrow_environment
_configure_narrow_argv
_c_exit
_cexit
_exit
__p___argv
_set_app_type
_seh_filter_exe
exit
_register_onexit_function
_initterm_e
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 364KB - Virtual size: 365KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ