D:\rust\jz\target\release\deps\yd3184.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8250c765f85e9d3c9ddf25f68e767968afc315882c12eea37660566041d99011.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8250c765f85e9d3c9ddf25f68e767968afc315882c12eea37660566041d99011.exe
Resource
win10v2004-20240226-en
General
-
Target
8250c765f85e9d3c9ddf25f68e767968afc315882c12eea37660566041d99011
-
Size
1.6MB
-
MD5
f29a4bee167487a5a85bd3924711a61d
-
SHA1
40ecba2d5095a5297ea5e9ba810375be46bb9a25
-
SHA256
8250c765f85e9d3c9ddf25f68e767968afc315882c12eea37660566041d99011
-
SHA512
234bd122e82a7ae81018aede74a849413b11a6be490ca8ea269f0795c7dd7d368260a80624560d1a496505f7ddfddd938af77d567e50cd8ce7c65fd71df036c7
-
SSDEEP
24576:GRIJMixFpr/IJEa8q/OjDj/5yWmS/RiTQn652FOwe:GR2/FpzI9mjHgWmS/RpT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8250c765f85e9d3c9ddf25f68e767968afc315882c12eea37660566041d99011
Files
-
8250c765f85e9d3c9ddf25f68e767968afc315882c12eea37660566041d99011.exe windows:6 windows x64 arch:x64
7a8adc6fce43760e7cb96def9af08752
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
CreateIoCompletionPort
SetFileCompletionNotificationModes
SetLastError
GetFinalPathNameByHandleW
GetQueuedCompletionStatusEx
TryAcquireSRWLockExclusive
Sleep
GetModuleHandleA
GetProcAddress
CompareStringW
LCMapStringW
GetStringTypeW
GetFileType
SetStdHandle
SetEnvironmentVariableW
SwitchToThread
HeapSize
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetConsoleOutputCP
GetCPInfo
HeapReAlloc
ReleaseSRWLockExclusive
GetOEMCP
GetProcessHeap
GetACP
IsValidCodePage
SetHandleInformation
GetCurrentThread
GetStdHandle
GetConsoleMode
WaitForSingleObject
MultiByteToWideChar
WriteConsoleW
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetCurrentProcess
ReleaseMutex
GetEnvironmentVariableW
RtlLookupFunctionEntry
GetModuleHandleW
FormatMessageW
GetFullPathNameW
CreateFileW
FindNextFileW
FindFirstFileExW
FindClose
CreateThread
SetThreadStackGuarantee
HeapAlloc
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentDirectoryW
RtlCaptureContext
AcquireSRWLockShared
ReleaseSRWLockShared
GetCommandLineW
GetCommandLineA
PostQueuedCompletionStatus
AddVectoredExceptionHandler
GetFileInformationByHandle
GetFileInformationByHandleEx
SetFilePointerEx
VirtualAlloc
VirtualProtect
VirtualFree
GetModuleHandleExW
TerminateProcess
ExitProcess
CloseHandle
GetModuleFileNameW
AcquireSRWLockExclusive
HeapFree
WriteFile
RtlPcToFileHeader
LoadLibraryExW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
EncodePointer
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
ws2_32
send
getsockopt
connect
getaddrinfo
recv
freeaddrinfo
WSAStartup
WSASocketW
WSACleanup
shutdown
getsockname
WSAGetLastError
getpeername
closesocket
bind
WSAIoctl
setsockopt
ioctlsocket
WSASend
ntdll
NtCreateFile
RtlNtStatusToDosError
NtDeviceIoControlFile
NtCancelIoFileEx
NtWriteFile
NtReadFile
crypt32
CertFreeCertificateChain
CertGetCertificateChain
CertCloseStore
CertDuplicateCertificateChain
CertAddCertificateContextToStore
CertOpenStore
CertEnumCertificatesInStore
CertVerifyCertificateChainPolicy
CertDuplicateStore
CertDuplicateCertificateContext
CertFreeCertificateContext
secur32
EncryptMessage
DeleteSecurityContext
FreeContextBuffer
ApplyControlToken
AcquireCredentialsHandleA
AcceptSecurityContext
FreeCredentialsHandle
DecryptMessage
QueryContextAttributesW
InitializeSecurityContextW
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 435KB - Virtual size: 434KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ