D:\CodeProject\hw_src\NPSC2\npc\target\release\deps\npc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a8b8d237e71d4abe959aff4517863d9f570bba1646ec4e79209ec29dda64552f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a8b8d237e71d4abe959aff4517863d9f570bba1646ec4e79209ec29dda64552f.exe
Resource
win10v2004-20240319-en
General
-
Target
a8b8d237e71d4abe959aff4517863d9f570bba1646ec4e79209ec29dda64552f
-
Size
2.3MB
-
MD5
fc6464148e82ca8801435f6957edadd5
-
SHA1
39f5a060cf181766a06e201970e62f4e143c01b8
-
SHA256
a8b8d237e71d4abe959aff4517863d9f570bba1646ec4e79209ec29dda64552f
-
SHA512
477a5f2052efc7a7564b67e9abf1f7527feca15f53973d51986730cd74f45e2bb11d4c20a473a8f8c62e4827a0e85fb954b4b65dd40b3e644ffa0a4c2b60e276
-
SSDEEP
49152:akOzgbmhpREd2YxoCsMQ+DdGG0015uQ/V2udj9IU6iW:Z6EsWg0E+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8b8d237e71d4abe959aff4517863d9f570bba1646ec4e79209ec29dda64552f
Files
-
a8b8d237e71d4abe959aff4517863d9f570bba1646ec4e79209ec29dda64552f.exe windows:6 windows x64 arch:x64
d85aaca4e85fb5a2b5bf0158ad821961
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
FindClose
SetFilePointerEx
MoveFileExW
FindFirstFileW
GetTickCount64
GlobalMemoryStatusEx
GetLogicalDrives
AddVectoredExceptionHandler
SetThreadStackGuarantee
RemoveDirectoryW
DeleteFileW
GetSystemInfo
SleepConditionVariableSRW
WakeConditionVariable
WakeAllConditionVariable
GetModuleHandleA
GetProcAddress
TryEnterCriticalSection
LeaveCriticalSection
GetStdHandle
GetConsoleMode
WriteConsoleW
SetLastError
GetCurrentDirectoryW
GetCurrentProcess
ReleaseMutex
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetCurrentThread
RtlCaptureContext
RtlLookupFunctionEntry
GetEnvironmentVariableW
GetModuleHandleW
FormatMessageW
CreateFileW
GetFileInformationByHandle
DeviceIoControl
EnterCriticalSection
InitializeCriticalSection
GetFullPathNameW
FindNextFileW
CreateDirectoryW
SetHandleInformation
ReadFileEx
SleepEx
GetEnvironmentStringsW
FreeEnvironmentStringsW
CompareStringOrdinal
GetFileAttributesW
GetModuleFileNameW
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
CreateNamedPipeW
DuplicateHandle
WaitForMultipleObjects
GetOverlappedResult
GetExitCodeProcess
CreateEventW
CancelIo
ReadFile
QueryPerformanceCounter
SetCurrentDirectoryW
GetSystemTimeAsFileTime
AcquireSRWLockShared
ReleaseSRWLockShared
CopyFileExW
CreateThread
ReadProcessMemory
LocalFree
GetProcessTimes
GetSystemTimes
GetProcessIoCounters
OpenProcess
VirtualQueryEx
GetDriveTypeW
GetVolumeInformationW
GetDiskFreeSpaceExW
RtlVirtualUnwind
FlushFileBuffers
GetTickCount
MapViewOfFile
CreateFileMappingW
FormatMessageA
GetSystemTime
WideCharToMultiByte
FreeLibrary
SystemTimeToFileTime
GetFileSize
LockFileEx
UnlockFile
HeapDestroy
HeapCompact
LoadLibraryW
DeleteFileA
CreateFileA
FlushViewOfFile
OutputDebugStringW
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
MultiByteToWideChar
HeapSize
HeapValidate
UnmapViewOfFile
CreateMutexW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
OutputDebugStringA
GetDiskFreeSpaceW
WriteFile
HeapCreate
AreFileApisANSI
DeleteCriticalSection
GetCurrentThreadId
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
TerminateProcess
Sleep
GetCurrentProcessId
GetComputerNameExW
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetLastError
WaitForSingleObject
SetUnhandledExceptionFilter
UnhandledExceptionFilter
SwitchToThread
CloseHandle
HeapReAlloc
GetProcessHeap
HeapAlloc
QueryPerformanceFrequency
HeapFree
ntdll
NtQueryInformationProcess
RtlGetVersion
NtQuerySystemInformation
advapi32
RegQueryValueExW
GetUserNameW
SystemFunction036
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
bcrypt
BCryptGenRandom
crypt32
CryptUnprotectData
iphlpapi
GetExtendedUdpTable
GetIfTable2
FreeMibTable
GetExtendedTcpTable
netapi32
NetUserGetLocalGroups
NetApiBufferFree
NetQueryDisplayInformation
ole32
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
VariantClear
pdh
PdhCloseQuery
PdhCollectQueryData
PdhOpenQueryA
PdhAddEnglishCounterW
PdhGetFormattedCounterValue
PdhRemoveCounter
powrprof
CallNtPowerInformation
psapi
EnumProcessModulesEx
GetModuleFileNameExW
GetPerformanceInfo
shell32
CommandLineToArgvW
dxgi
CreateDXGIFactory1
d3d11
D3D11CreateDevice
ws2_32
send
WSASend
setsockopt
recv
WSAStartup
closesocket
ioctlsocket
connect
WSAGetLastError
select
bind
getsockname
freeaddrinfo
getsockopt
WSACleanup
getaddrinfo
WSASocketW
vcruntime140
memcpy
__CxxFrameHandler3
memmove
memcmp
strrchr
__C_specific_handler
__current_exception_context
memset
__current_exception
api-ms-win-crt-string-l1-1-0
strlen
strcspn
strcmp
wcslen
strncmp
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
realloc
free
_msize
api-ms-win-crt-time-l1-1-0
_localtime64_s
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_initterm
_register_onexit_function
_crt_atexit
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
terminate
_initterm_e
_get_initial_narrow_environment
__p___argv
__p___argc
_initialize_narrow_environment
_exit
_beginthreadex
_endthreadex
_seh_filter_exe
_set_app_type
_configure_narrow_argv
exit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 602KB - Virtual size: 601KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ