d:\skin_engine\Projects\debugforxp\skin_unit_test.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e0310fb576322d0fc67b60214c2a96e40c97031e1a4148340b7dbaa16920fa9b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e0310fb576322d0fc67b60214c2a96e40c97031e1a4148340b7dbaa16920fa9b.exe
Resource
win10v2004-20240226-en
General
-
Target
e0310fb576322d0fc67b60214c2a96e40c97031e1a4148340b7dbaa16920fa9b
-
Size
116KB
-
MD5
528ab5f1e44569b8a96e08ab508ef49e
-
SHA1
c19b822016ca355f9b9a4f5e4a91b9434f02bd6e
-
SHA256
e0310fb576322d0fc67b60214c2a96e40c97031e1a4148340b7dbaa16920fa9b
-
SHA512
38d83b6cf8afc0955e2904cec7657e3da27df3b4bd8b78d126c8ac76c28d3947077f1d97fcf572042b945926338734559f14f44c32191c40aaa79d7e7b796749
-
SSDEEP
768:4ZR8TOXegGbLVzg8wE8GU6yx1lOL6ZU9QZU9:zTOXm+8wBGU6+bOmz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0310fb576322d0fc67b60214c2a96e40c97031e1a4148340b7dbaa16920fa9b
Files
-
e0310fb576322d0fc67b60214c2a96e40c97031e1a4148340b7dbaa16920fa9b.exe windows:4 windows x86 arch:x86
02578b6d6167650552b8918dc54ddcb8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryW
GetModuleFileNameW
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LoadLibraryA
lstrlenA
MultiByteToWideChar
IsDebuggerPresent
WideCharToMultiByte
DebugBreak
RaiseException
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
FreeLibrary
msvcp80d
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
?rfind@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEI_WI@Z
?npos@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@2IB
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
msvcr80d
_controlfp_s
_invoke_watson
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_XcptFilter
_exit
__wgetmainargs
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_CRT_RTC_INITW
_CrtDbgReportW
memset
??3@YAXPAX@Z
?terminate@@YAXXZ
_cexit
_initterm_e
_initterm
_CrtSetCheckCount
_wcmdln
_amsg_exit
exit
_crt_debugger_hook
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ