E:\Projects\NSudo\Output\Release\x64\NSudo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
19896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618.exe
Resource
win10v2004-20240226-en
General
-
Target
19896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618
-
Size
247KB
-
MD5
5cae01aea8ed390ce9bec17b6c1237e4
-
SHA1
3a80a49efaac5d839400e4fb8f803243fb39a513
-
SHA256
19896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618
-
SHA512
c8e54c92133ba686238ea554c1cd82ba441db5fd4b0cbd5082d5eb4ddfcedd15506b9dac553459d0b2221c75778241f926ed3eef64571e4b1e0eb6f80ff9b481
-
SSDEEP
3072:n3vg+rJrkQVOUPrxLExK08A+MQ20AFHxH32Hdxkq5:n3vg+rOgOyrNEI3AxQUHK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618
Files
-
19896a23d7b054625c2f6b1ee1551a0da68ad25cddbb24510a3b74578418e618.exe windows:6 windows x64 arch:x64
55fa9bd502457bea13d3626a68dc1cad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
DeleteCriticalSection
WaitForSingleObjectEx
GetCurrentProcess
GetCurrentThreadId
ResumeThread
SetPriorityClass
OpenProcess
FreeLibrary
LoadLibraryW
MulDiv
CopyFileW
MoveFileExW
InitializeCriticalSectionEx
TerminateProcess
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
GetProcessHeap
HeapFree
HeapAlloc
OutputDebugStringW
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
DecodePointer
RaiseException
SetFileAttributesW
GetFileAttributesW
DeleteFileW
ExpandEnvironmentStringsW
GetCommandLineW
SizeofResource
LockResource
LoadResource
FindResourceExW
GetSystemWindowsDirectoryW
SleepEx
SetLastError
CloseHandle
VerifyVersionInfoW
GetModuleHandleW
VerSetConditionMask
MultiByteToWideChar
GetProcAddress
GetModuleFileNameW
GetTickCount64
QueryPerformanceCounter
GetLastError
GetSystemTimeAsFileTime
GetCurrentProcessId
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
EncodePointer
InitOnceExecuteOnce
user32
EndPaint
GetWindowTextW
GetClientRect
BeginPaint
LoadImageW
MonitorFromWindow
ChangeWindowMessageFilter
GetDC
SetWindowLongPtrW
UnregisterClassW
DialogBoxParamW
SendMessageW
SetWindowTextW
DrawIconEx
EndDialog
GetDlgItem
gdi32
GetDeviceCaps
comdlg32
GetOpenFileNameW
advapi32
RegDeleteTreeW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
SetTokenInformation
RevertToSelf
InitializeAcl
GetTokenInformation
GetLengthSid
GetAce
FreeSid
EqualSid
DuplicateTokenEx
CreateRestrictedToken
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAce
AddAccessAllowedAce
OpenProcessToken
SetThreadToken
CreateProcessAsUserW
StartServiceW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
shell32
DragQueryFileW
DragFinish
ole32
CoInitializeEx
wtsapi32
WTSQueryUserToken
WTSEnumerateProcessesW
WTSFreeMemory
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
msvcrt
abort
fseek
__C_specific_handler
_cexit
??0exception@@QEAA@AEBQEBD@Z
__setusermatherr
_initterm
_initterm_e
exit
_exit
_c_exit
__wgetmainargs
atexit
_wcmdln
_lock
_unlock
_fseeki64
?terminate@@YAXXZ
_strtoi64
_strtoui64
??0exception@@QEAA@XZ
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
_XcptFilter
fsetpos
fwrite
memmove
memcpy
??2@YAPEAX_K@Z
memset
setlocale
??3@YAXPEAX@Z
memcmp
localeconv
ungetc
setvbuf
fread
fputc
fgetpos
fgetc
fflush
fclose
strtod
_set_fmode
malloc
free
_wcsicmp
wcsrchr
_errno
??_V@YAXPEAX@Z
__CxxFrameHandler3
_CxxThrowException
_wcsnicmp
_iob
_vsnprintf
__set_app_type
_commode
wcslen
__dllonexit
wcsstr
_wfsopen
msvcp60
_Toupper
_Tolower
_Getctype
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 716B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ