C:\Users\echo\source\repos\btlo4\Release\btlo4.pdb
Static task
static1
Behavioral task
behavioral1
Sample
re4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
re4.exe
Resource
win10v2004-20240419-en
General
-
Target
re4.exe
-
Size
12KB
-
MD5
2c37ac2cd4d8d82d3ffc28a56f7a7902
-
SHA1
4730c36ecd2e6f199fe4a22b8f055ecba0edb105
-
SHA256
4e56373fb7149b2ca283a32303ca02499c912ec465bce9c18ed0b73e1adeb45f
-
SHA512
ea01f87ceaaf47d3999dc81de47370f381c951eb8baf7192cf3e97534b7dc004e74e8df50bebe3ae86a18bc48dceb049e573f3e3fa3c488c0627ca8a7e1fdd0a
-
SSDEEP
192:Lh6/EpD3YVzDDvVCDRA0ofXrjOW56WY9vNq7E5pzcVSN9:Lh68F3Uv4DRA0EXrjl6WY9s76N9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource re4.exe
Files
-
re4.exe.exe windows:6 windows x86 arch:x86
Password: infected
0c7922469e32a1fe1c8bc9fec09d2f8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReadFile
WriteProcessMemory
ResumeThread
GetModuleHandleA
GetLastError
CreateFileA
HeapAlloc
GetThreadContext
GetProcAddress
VirtualAllocEx
GetFileSize
ReadProcessMemory
GetProcessHeap
CreateProcessA
SetThreadContext
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
ntdll
NtQueryInformationProcess
vcruntime140
__current_exception
__current_exception_context
memset
_except_handler4_common
_CxxThrowException
__std_exception_destroy
__std_exception_copy
api-ms-win-crt-runtime-l1-1-0
__p___argc
_get_initial_narrow_environment
_initialize_onexit_table
_register_onexit_function
_c_exit
_crt_atexit
_controlfp_s
terminate
_exit
_initialize_narrow_environment
_cexit
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
_initterm
system
__p___argv
_set_app_type
_seh_filter_exe
_initterm_e
exit
api-ms-win-crt-heap-l1-1-0
_callnewh
free
malloc
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 556B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ