c:\Users\tom_rus\Documents\Visual Studio 2022\Projects\ida_keygen - Copy\ida_keygen\bin\Release\net6.0\win-x64\native\ida_keygen.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ida_keygen.exe
Resource
win10v2004-20240419-en
General
-
Target
ida_keygen.exe
-
Size
5.3MB
-
MD5
df02135d4bd17c9e1f29c2e331ad243e
-
SHA1
e7a292b83da3bf2cb61335db728436d79ccea7cd
-
SHA256
9b54e11c659654d065eab45632e820b11c59eeeb7f4c496772f1d5d4b14f36f8
-
SHA512
342836a5ddd28bc63aac6287a6f9f388d1ce90c91e363c0995d06b85437b2e8bf43e76a929485c6679a5272f3cf61c6a64584dbeac3e068c1b57948c9a9a4a5c
-
SSDEEP
49152:B8u6Xl4hiSEcemhEdtvu9AuZXeQKj70iB4rWklihA847brFbY2fwlFfYVFJjQ/BY:8SWTxfpQFJU/fXe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ida_keygen.exe
Files
-
ida_keygen.exe.exe windows:6 windows x64 arch:x64
Password: breaktrace
12cae415cc33d84b99721f605f8bf239
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
EnumerateTraceGuidsEx
EventSetInformation
EventUnregister
RegCloseKey
EventActivityIdControl
EventRegister
EventWriteTransfer
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
EventWrite
EventEnabled
bcrypt
BCryptFinishHash
BCryptGenRandom
BCryptHashData
BCryptOpenAlgorithmProvider
BCryptCloseAlgorithmProvider
BCryptGetProperty
BCryptCreateHash
BCryptDestroyHash
kernel32
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
CompareStringW
CloseThreadpoolIo
SetLastError
ExpandEnvironmentStringsW
GetLastError
GetCurrentProcessId
GetEnvironmentVariableW
MultiByteToWideChar
GetStdHandle
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
LoadLibraryExW
FileTimeToSystemTime
GetSystemTime
GetTickCount64
GetCurrentProcessorNumber
GetCurrentProcess
GetCurrentThread
WaitForSingleObject
Sleep
CreateThreadpoolWork
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
InitializeCriticalSection
InitializeConditionVariable
DeleteCriticalSection
LocalFree
EnterCriticalSection
SleepConditionVariableCS
LeaveCriticalSection
WakeConditionVariable
WaitForMultipleObjectsEx
GetFullPathNameW
GetLongPathNameW
GetProcAddress
LocalAlloc
GetConsoleOutputCP
WideCharToMultiByte
RaiseFailFastException
WaitForThreadpoolWaitCallbacks
CreateThreadpoolIo
StartThreadpoolIo
CancelThreadpoolIo
CreateFileW
DeleteFileW
FlushFileBuffers
FreeLibrary
GetCurrentDirectoryW
GetFileInformationByHandleEx
GetFileType
GetOverlappedResult
ReadFile
SetConsoleCtrlHandler
SetFileInformationByHandle
SetFilePointerEx
SetThreadErrorMode
GetDynamicTimeZoneInformation
GetTimeZoneInformation
WriteFile
CloseHandle
SetEvent
ResetEvent
CreateEventExW
FormatMessageW
CreateThread
ResumeThread
DuplicateHandle
GetThreadPriority
SetThreadPriority
VerSetConditionMask
GetExitCodeProcess
CreateProcessW
OpenProcess
K32EnumProcesses
GetProcessId
CreatePipe
GetCPInfoExW
GetConsoleCP
GetConsoleScreenBufferInfo
GetConsoleMode
ReadConsoleW
SetConsoleTextAttribute
WriteConsoleW
FlushProcessWriteBuffers
GetCurrentThreadId
WaitForSingleObjectEx
VirtualQuery
AddVectoredExceptionHandler
FlsAlloc
FlsGetValue
FlsSetValue
CreateEventW
TerminateProcess
SwitchToThread
SuspendThread
GetThreadContext
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
QueryInformationJobObject
GetModuleHandleExW
GetProcessAffinityMask
InitializeCriticalSectionEx
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
DebugBreak
SleepEx
GlobalMemoryStatusEx
GetTickCount
GetLogicalProcessorInformation
GetLogicalProcessorInformationEx
GetLargePageMinimum
VirtualUnlock
GetWriteWatch
ResetWriteWatch
VirtualAllocExNuma
IsProcessInJob
GetNumaHighestNodeNumber
K32GetProcessMemoryInfo
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleFileNameW
ExitProcess
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
ole32
CoUninitialize
CoTaskMemAlloc
CoGetApartmentType
CoCreateGuid
CoTaskMemFree
CoWaitForMultipleHandles
CoInitializeEx
Exports
Exports
DotNetRuntimeDebugHeader
Sections
.text Size: 470KB - Virtual size: 469KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.managed Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 230KB - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ