C:\Users\lucid\Downloads\anti-debug\AntiDBG-master\x64\Release\AntiDBG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
AntiDBG.exe
Resource
win10v2004-20240426-en
General
-
Target
AntiDBG.exe
-
Size
27KB
-
MD5
d65b4a9b079f6a0f459df462fbd4d702
-
SHA1
d2f338c144596cce7d3f08a3907ed368b9f5b667
-
SHA256
b5d16be248daf771bea322d6ca009de11ac3ccd72b572d575ce31dcda6c4ec2a
-
SHA512
0999533db13ac72ab79319fde4b8de7224db054ff4a0f66e8eaf012830bae7872895b20d458a2d55acbf3040f35ec2d737f2b7b0061d43579fdcc8b9440e0241
-
SSDEEP
384:xPqYBjh0Nw12psH1h7DNiePC2+SWTQXqHAW6tTLigEL3emsEmeBNvXehZ9BNfdrY:xiYCvap0AhtTLibOamCehPtTsF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource AntiDBG.exe
Files
-
AntiDBG.exe.exe windows:6 windows x64 arch:x64
7c3d7cc46010e301c4b39a385c7e9255
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
WriteProcessMemory
GetCurrentProcess
GetModuleFileNameW
CreateMutexW
WaitForSingleObject
OpenProcess
SetProcessMitigationPolicy
GetTickCount64
GetLastError
GetCurrentThread
QueryPerformanceFrequency
CloseHandle
VirtualProtectEx
GetThreadContext
GetProcAddress
DebugActiveProcess
GetCurrentProcessId
CreateProcessA
QueryPerformanceCounter
IsDebuggerPresent
CheckRemoteDebuggerPresent
GetExitCodeProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetModuleHandleW
user32
MessageBoxA
msvcp140
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Xlength_error@std@@YAXPEBD@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlAdjustPrivilege
NtRaiseHardError
RtlVirtualUnwind
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception
__std_exception_destroy
memcpy
memset
__current_exception_context
_CxxThrowException
__C_specific_handler
wcsstr
__std_exception_copy
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_c_exit
_exit
_seh_filter_exe
_cexit
_register_onexit_function
_crt_atexit
_initterm_e
terminate
__p___argv
_set_app_type
__p___argc
_initialize_onexit_table
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_invalid_parameter_noinfo_noreturn
system
exit
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vsprintf
__p__commode
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ