C:\Users\Administrator\Desktop\EDR-Bypass-demo-main\demo1\shellcode_execute\shellcode_execute\x64\Release\shellcode.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ff08ebc061d3f972c400fc35a96dc17f775fe2e0cd68fcd3a2e5d0502b674111.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ff08ebc061d3f972c400fc35a96dc17f775fe2e0cd68fcd3a2e5d0502b674111.exe
Resource
win10v2004-20240508-en
General
-
Target
ff08ebc061d3f972c400fc35a96dc17f775fe2e0cd68fcd3a2e5d0502b674111.exe
-
Size
467KB
-
MD5
a51b2a8d837bb297fb035ca947af22f6
-
SHA1
91e1143b5aac044738da82a8b16ee18197566a31
-
SHA256
ff08ebc061d3f972c400fc35a96dc17f775fe2e0cd68fcd3a2e5d0502b674111
-
SHA512
b5338ebba2baeca63e02bc0134709eda91bcb43b3bbc80aea712ac460e52d89a4475a1bf5c4ec746242297af9e723f7a6c74f8996a6dc88cac72a1dde44422f0
-
SSDEEP
12288:SV88VyWYgeWYg955/155/rilvQ8Hyu16j4aa7mCo:SV88wl5U8b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ff08ebc061d3f972c400fc35a96dc17f775fe2e0cd68fcd3a2e5d0502b674111.exe
Files
-
ff08ebc061d3f972c400fc35a96dc17f775fe2e0cd68fcd3a2e5d0502b674111.exe.exe windows:6 windows x64 arch:x64
9b8fef7d891db2fea5393a0f5eda4de9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetModuleHandleA
CreateToolhelp32Snapshot
Process32Next
FreeConsole
GetProcAddress
FlushInstructionCache
VirtualAlloc
GetLastError
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
WriteConsoleW
GetCurrentProcess
VirtualFree
IsDebuggerPresent
Process32First
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetCurrentThreadId
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetStringTypeW
GetCPInfo
InitializeSListHead
WakeAllConditionVariable
SleepConditionVariableSRW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetCurrentProcessId
GetStartupInfoW
RtlUnwindEx
InterlockedPushEntrySList
RtlPcToFileHeader
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
HeapReAlloc
HeapSize
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CloseHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetProcessHeap
CreateFileW
RtlUnwind
Sections
.text Size: 309KB - Virtual size: 309KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ