d:\projects\exhud\Release\exhud.pdb
Static task
static1
Behavioral task
behavioral1
Sample
90aa7ff96a792c520f52f606ed54f8491e68f594d3c59124a17cb972b473d31f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
90aa7ff96a792c520f52f606ed54f8491e68f594d3c59124a17cb972b473d31f.exe
Resource
win10v2004-20240419-en
General
-
Target
90aa7ff96a792c520f52f606ed54f8491e68f594d3c59124a17cb972b473d31f
-
Size
11KB
-
MD5
aaacd0721a8cec9420e60ff45e7f60bb
-
SHA1
65172581784fa95c5964e1e181082ab5792b031d
-
SHA256
90aa7ff96a792c520f52f606ed54f8491e68f594d3c59124a17cb972b473d31f
-
SHA512
5bb492ce8fa16cf1039a53ca00ef282ca0a0dbd54254dec5e57e3615625919442212b191296308c1f6a4e04e77868ef6fc599c2d86ba7b6aadf17036d533ad5f
-
SSDEEP
192:2mBqV2QaE3bXD/c5ykQ4FWzv+i+FNSNq82vtaKJJ9Eq7cVt63G:Nc2QaE3bo5ykQ4EzWi+jh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90aa7ff96a792c520f52f606ed54f8491e68f594d3c59124a17cb972b473d31f
Files
-
90aa7ff96a792c520f52f606ed54f8491e68f594d3c59124a17cb972b473d31f.exe windows:5 windows x86 arch:x86
d04fbec33714f194ef91ba725b0551fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
msvcp90
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?length@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
msvcr90
_amsg_exit
??2@YAPAXI@Z
_cexit
_exit
_XcptFilter
__initenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
exit
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
memset
_errno
strcpy
strerror
memcpy
fprintf
??_V@YAXPAX@Z
__iob_func
__p__commode
__getmainargs
_read
_lseek
_close
_open
_write
_mkdir
__CxxFrameHandler3
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ