C:\Users\hayat\Documents\Visual Studio 2019\repos\SketchUp Patch\x64\Release\Activator.pdb
Behavioral task
behavioral1
Sample
Activator.exe
Resource
win10v2004-20240426-es
General
-
Target
Activator.exe
-
Size
713KB
-
MD5
f0a5ebae145390e86820310c7be7d28d
-
SHA1
f8c6d399c3ecf0c239fa1bbc2d9a86f376444ae3
-
SHA256
d759b44ef4b0e86c75b73383138d578029997f5458f287049f6c3e7d8b5852b9
-
SHA512
38dba2eb795adc92069451f02984e6abff3003c61366acb6f03175260247b02c3bf8163d728095e731e2d4311e3569cbf0d7d72a317d73aeb70d2260d6756040
-
SSDEEP
6144:OB8VXgl2/nOzEpBZ0qa3OrQuVdvQ4btpLt:Og/nKo0qIsdnL
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule sample agile_net -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Activator.exe
Files
-
Activator.exe.exe windows:6 windows x64 arch:x64
a641bec5078d387858c6d10fa115aa0a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
QueryPerformanceCounter
Sleep
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
api-ms-win-crt-runtime-l1-1-0
_seh_filter_dll
_cexit
_crt_at_quick_exit
_crt_atexit
_execute_onexit_table
abort
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
terminate
vcruntime140
__CxxRegisterExceptionObject
__CxxDetectRethrow
__CxxExceptionFilter
__FrameUnwindFilter
__CxxUnregisterExceptionObject
__CxxQueryExceptionSize
__C_specific_handler
__current_exception
__current_exception_context
memset
mscoree
_CorExeMain
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.nep Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 421KB - Virtual size: 421KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ