C:\Users\User1\Desktop\dev projects\SignSploit1\x64\Release\AsrDrv_exploit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
69296ca3575d9bc04ce0250d734d1a83c1348f5b6da756944933af0578bd41d2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69296ca3575d9bc04ce0250d734d1a83c1348f5b6da756944933af0578bd41d2.exe
Resource
win10v2004-20240226-en
General
-
Target
69296ca3575d9bc04ce0250d734d1a83c1348f5b6da756944933af0578bd41d2
-
Size
435KB
-
MD5
838f055690a2a3617be42b8101c27d49
-
SHA1
95bd07b4400095acdafce05888da27228d7d07ca
-
SHA256
69296ca3575d9bc04ce0250d734d1a83c1348f5b6da756944933af0578bd41d2
-
SHA512
42e16b41a7ce57ab35172a80383f09c5536d9eda4c66e0417278948fdd5f828c0f66374819db15ac59bc9aaec7cb491b6432e3a2e96b2a9318d7ae2e2c6d37c3
-
SSDEEP
6144:HG7pXZ07Hxn+X9vR3iXh+LxJNCbxS0CUvPupYoW8d3qdCx77pGuPmHKN:6pXZoRn+n3iXh+hR5qdCx77VPmHM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69296ca3575d9bc04ce0250d734d1a83c1348f5b6da756944933af0578bd41d2
Files
-
69296ca3575d9bc04ce0250d734d1a83c1348f5b6da756944933af0578bd41d2.exe windows:6 windows x64 arch:x64
f139e860bc959a7e65a008399425c090
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetTickCount
VirtualAlloc
CreateFileW
GetModuleHandleA
GetProcAddress
CloseHandle
ReadFile
GetFileSize
SetEndOfFile
OpenFile
ReadConsoleW
FlushFileBuffers
HeapQueryInformation
HeapReAlloc
HeapFree
GetProcessHeap
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
EncodePointer
FreeLibrary
LoadLibraryExW
GetModuleFileNameW
GetModuleHandleExW
GetStdHandle
WriteFile
ExitProcess
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapSize
HeapValidate
GetSystemInfo
CompareStringW
LCMapStringW
GetFileType
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
OutputDebugStringW
WriteConsoleW
GetConsoleCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
advapi32
RegQueryValueExW
RegOpenKeyExW
StartServiceW
CloseServiceHandle
OpenServiceA
CreateServiceA
OpenSCManagerW
RegCloseKey
bcrypt
BCryptEncrypt
BCryptGenerateSymmetricKey
BCryptGetProperty
BCryptOpenAlgorithmProvider
BCryptDestroyKey
BCryptCloseAlgorithmProvider
Sections
.text Size: 285KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ