C:\Users\lucid\Downloads\anti-debug\AntiDBG-master\x64\Release\AntiDBG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
lmfao.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
lmfao.exe
Resource
win11-20240426-en
General
-
Target
lmfao.exe
-
Size
25KB
-
MD5
5cd767387024d8af3f33a946adf3b6cd
-
SHA1
98ecc94903b0d9ef0f388a073c336fd9a1c70711
-
SHA256
6994c79877a6ca3ae7f9080f36c6920b8fb846ac655314ca37a40b4f3ade56d1
-
SHA512
cfdb1b64340e1ca071462113bf35fd528ae39673af7508b47c2d3788bed305cf77fb7d0188f207bfcbff60fcdf4995a6dc4881346075644bf76ea631f141f59e
-
SSDEEP
384:SSVnJB7t+NyaRW+e/1qwonqIHy4fpu5D8I3FDLlbwm+J+cW+OjO/RdJYTUQdWGQt:SSlJ4ju1DLlbbC+cW3j6wJdWGQIsP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource lmfao.exe
Files
-
lmfao.exe.exe windows:6 windows x64 arch:x64
4d63916f6d284399a561d1ae803f919a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
WriteProcessMemory
GetCurrentProcess
GetModuleFileNameW
CreateMutexW
WaitForSingleObject
OpenProcess
SetProcessMitigationPolicy
GetTickCount64
GetLastError
GetCurrentThread
CloseHandle
VirtualProtectEx
GetThreadContext
GetProcAddress
DebugActiveProcess
GetCurrentProcessId
CreateProcessA
QueryPerformanceCounter
IsDebuggerPresent
CheckRemoteDebuggerPresent
GetExitCodeProcess
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThreadId
GetSystemTimeAsFileTime
RtlCaptureContext
InitializeSListHead
GetModuleHandleW
user32
MessageBoxA
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAHXZ
vcruntime140_1
__CxxFrameHandler4
vcruntime140
_CxxThrowException
wcsstr
__current_exception
memcpy
__std_exception_destroy
__C_specific_handler
__std_exception_copy
__current_exception_context
memset
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_cexit
_exit
_set_app_type
_initterm_e
_initialize_onexit_table
__p___argv
_crt_atexit
terminate
_seh_filter_exe
exit
_initterm
__p___argc
_c_exit
_register_onexit_function
_get_initial_narrow_environment
_initialize_narrow_environment
_invalid_parameter_noinfo_noreturn
_configure_narrow_argv
system
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
__stdio_common_vfprintf
__p__commode
_set_fmode
__stdio_common_vsprintf
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ