D:\AFL&angr\my_winafl_fuzz\dynamorio\build64\bin64\DRload.pdb
Static task
static1
Behavioral task
behavioral1
Sample
521ba0d3787308db64e851485971ba965e22ef03939a55e387af73531fccda65.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
521ba0d3787308db64e851485971ba965e22ef03939a55e387af73531fccda65.exe
Resource
win10v2004-20240426-en
General
-
Target
521ba0d3787308db64e851485971ba965e22ef03939a55e387af73531fccda65
-
Size
160KB
-
MD5
12b2f2a2ab0d0948d4c04a044fa37d6c
-
SHA1
620ee4657b0c4e6c97c7d3495460ce8348064ff9
-
SHA256
521ba0d3787308db64e851485971ba965e22ef03939a55e387af73531fccda65
-
SHA512
e50042ac95816c831d74e384158bb9fa70f0a6ff7d7657b8f6286b5247cf138cf9b9eb3c5985d730e6cbbbb684125b47c570d8aaa7f63e1b84231d478fc90e96
-
SSDEEP
3072:RXV4XrNNcd9VaHKVK9gupfn7Zc9ABklBwgx0/vJbaHnQLMv:1VKcDVKUogsNtklBx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 521ba0d3787308db64e851485971ba965e22ef03939a55e387af73531fccda65
Files
-
521ba0d3787308db64e851485971ba965e22ef03939a55e387af73531fccda65.exe windows:5 windows x64 arch:x64
1c2b2465db1ee9ed2c968eab27a6e63f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
user32
MessageBeep
kernel32
GetModuleFileNameW
SetEndOfFile
CreateFileA
CloseHandle
GetLastError
Sleep
GetCurrentProcess
VirtualQuery
VirtualAllocEx
CreateFileMappingW
MapViewOfFileEx
GetProcAddress
LoadLibraryExA
LoadLibraryA
WriteConsoleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RaiseException
GetStdHandle
WriteFile
RtlUnwind
ExitProcess
TerminateProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
MultiByteToWideChar
GetFileAttributesExW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
GetProcessHeap
SetFilePointerEx
ReadFile
ReadConsoleW
CreateFileW
GetFileSizeEx
HeapSize
HeapReAlloc
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ