C:\Users\WP\source\repos\gdrv-loader-master-v2\bin\swind2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win10v2004-20240226-en
General
-
Target
loader.exe
-
Size
17KB
-
MD5
8ef6c87e0fab9e206073c8b8b08aebd1
-
SHA1
279cdbc30f601532c2bd2f98c47a475d6ad8bca0
-
SHA256
e77ca98810057ee201cba65da008cb94e4cca25a493f4ea1d1badc075e666256
-
SHA512
13447fe4e4d5b5bdd75b5019125c32185b5a1e5186af24c3f16b1e72489d2625381cec61e11cd6ac2565f54877b816a46c209aa4b375f009fb34ea4d00638fa1
-
SSDEEP
192:XGPrd3NAz9dVGGl68vjaC6Kikuy497oR61uYaP2kPPq89aD6RHRea:XGPjBG3bJMbtQYaP2kPPaqRx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource loader.exe
Files
-
loader.exe.exe windows:6 windows x64 arch:x64
8550b9122a4d909a8607237e7d2f9bac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntdll
RtlDosPathNameToRelativeNtPathName_U_WithStatus
RtlReleaseRelativeName
NtClose
RtlFreeHeap
NtCreateFile
NtMapViewOfSection
RtlWriteRegistryValue
NtQuerySystemInformation
NtUnloadDriver
NtCreateSection
_snwprintf
RtlInitUnicodeString
wcscpy_s
wcscat_s
RtlGetFullPathName_UEx
NtDeviceIoControlFile
RtlAdjustPrivilege
_stricmp
NtUnmapViewOfSection
NtLoadDriver
memcmp
NtTerminateProcess
RtlNormalizeProcessParams
RtlAllocateHeap
RtlCreateRegistryKey
_vsnwprintf
strcmp
kernel32
ReadConsoleInputW
WriteConsoleW
shlwapi
SHDeleteKeyW
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ