C:\Users\dell\source\repos\test_hollow\x64\Release\test_hollow.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a403e0f85230ac445fba27848e77bdf17704591498f95f5ff6bb623c9813af81.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a403e0f85230ac445fba27848e77bdf17704591498f95f5ff6bb623c9813af81.exe
Resource
win10v2004-20240508-en
General
-
Target
a403e0f85230ac445fba27848e77bdf17704591498f95f5ff6bb623c9813af81
-
Size
15KB
-
MD5
dd1bea87e4a633db8ff8edf04fc9799a
-
SHA1
45a3f53cb64b0dff1d8f8104415f93e59077d60b
-
SHA256
a403e0f85230ac445fba27848e77bdf17704591498f95f5ff6bb623c9813af81
-
SHA512
76d0cf3290a6fd1f12c49bc0f8e032ec94bf7e93965b7c2a353f19757c9199eaaf30c668639672cf6cca664c13cd374018ca04d65c0c2c89210c8882b7ccc748
-
SSDEEP
192:YQ5cz5askJEQ0unUOVzVre7RCldFT/alxbHgJTVXD3Q5tfzcZE4U:YQUsEQ0unb5YwpDafzg7XD39t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a403e0f85230ac445fba27848e77bdf17704591498f95f5ff6bb623c9813af81
Files
-
a403e0f85230ac445fba27848e77bdf17704591498f95f5ff6bb623c9813af81.exe windows:6 windows x64 arch:x64
385811c2de63444096ddb29c8928e2b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetTempPathA
GetLastError
CloseHandle
VirtualProtectEx
ResumeThread
VirtualAllocEx
ReadProcessMemory
CreateProcessA
SetThreadContext
RtlLookupFunctionEntry
GetCurrentDirectoryA
WaitForSingleObject
GetThreadContext
WriteProcessMemory
RtlVirtualUnwind
RtlCaptureContext
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
vcruntime140
__current_exception
__C_specific_handler
__current_exception_context
memset
memcpy
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
rewind
__p__commode
__stdio_common_vfprintf
fgetc
fseek
fclose
__acrt_iob_func
fopen
fputc
ftell
_set_fmode
api-ms-win-crt-runtime-l1-1-0
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
__p___argv
__p___argc
_initterm_e
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_exit
exit
_set_app_type
_seh_filter_exe
_configure_narrow_argv
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ