C:\Users\Ex\Desktop\Free temp src\x64\Release\ware.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ware (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ware (1).exe
Resource
win10v2004-20240226-en
General
-
Target
ware (1).exe
-
Size
671KB
-
MD5
8706f909fd7a2114fda7b219bb388d54
-
SHA1
bcb89a2ec16cfb0851744c594e53b185fc2f3abb
-
SHA256
650765f563202651185e1904afd48d2b8eb078117f767b37656e0b91ababbb4c
-
SHA512
d6ff6c094fe1b7f473f88cc5b529f2d64e267281d072fa505d0e41ee594d8cbe50509dfbe1bb92bcec226c1259017894808020760c602e93e48dbee59d555abb
-
SSDEEP
12288:9NSv70HBC0psEZyN2o9GCP8Mb+AwC18WoDblNxID:uCBC0+EsnGCPbbQseblN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ware (1).exe
Files
-
ware (1).exe.exe windows:6 windows x64 arch:x64
a22c2631a7a3e09aa6cee254381741d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetSystemDirectoryA
SleepEx
GetProcAddress
LoadLibraryA
QueryPerformanceFrequency
VerSetConditionMask
LeaveCriticalSection
EnterCriticalSection
FormatMessageA
SetLastError
QueryFullProcessImageNameW
GetModuleHandleW
FreeLibrary
VerifyVersionInfoA
QueryPerformanceCounter
GetModuleFileNameA
MoveFileExA
WaitForSingleObjectEx
MultiByteToWideChar
GetEnvironmentVariableA
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
CreateFileA
GetFileSizeEx
WideCharToMultiByte
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
VirtualProtect
GetCurrentProcess
DeleteCriticalSection
InitializeCriticalSectionEx
GetLastError
GetConsoleWindow
OutputDebugStringW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
Beep
CreateThread
Sleep
GetStdHandle
SetConsoleTitleA
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
CloseHandle
GetTickCount
CreateFileW
user32
MessageBoxA
FindWindowA
SetLayeredWindowAttributes
GetAsyncKeyState
ShowWindow
GetDC
advapi32
GetTokenInformation
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
SetSecurityInfo
IsValidSid
InitializeAcl
GetUserNameA
CryptCreateHash
OpenProcessToken
AddAccessAllowedAce
GetLengthSid
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptGenRandom
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
?_Xbad_function_call@std@@YAXXZ
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
_Query_perf_frequency
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_Throw_Cpp_error@std@@YAXH@Z
??Bid@locale@std@@QEAA_KXZ
?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?good@ios_base@std@@QEBA_NXZ
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
_Query_perf_counter
_Cnd_do_broadcast_at_thread_exit
?_Random_device@std@@YAIXZ
?id@?$ctype@D@std@@2V0locale@2@A
?uncaught_exception@std@@YA_NXZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Xout_of_range@std@@YAXPEBD@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
normaliz
IdnToAscii
wldap32
ord301
ord217
ord46
ord211
ord60
ord45
ord200
ord41
ord22
ord26
ord79
ord27
ord32
ord50
ord33
ord35
ord30
ord143
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertOpenStore
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertGetNameStringA
ws2_32
WSACleanup
accept
htonl
WSAIoctl
ioctlsocket
__WSAFDIsSet
select
getaddrinfo
freeaddrinfo
recvfrom
sendto
ntohl
WSASetLastError
socket
setsockopt
ntohs
htons
getsockopt
getpeername
connect
bind
WSAGetLastError
send
recv
closesocket
gethostname
WSAStartup
listen
getsockname
rpcrt4
RpcStringFreeA
UuidToStringA
UuidCreate
psapi
GetModuleInformation
vcruntime140_1
__CxxFrameHandler4
vcruntime140
strrchr
__current_exception
memset
memmove
memcpy
memcmp
memchr
_CxxThrowException
__std_terminate
__std_exception_copy
__std_exception_destroy
strstr
__current_exception_context
strchr
__C_specific_handler
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
system
_beginthreadex
terminate
_getpid
__sys_nerr
exit
_register_thread_local_exe_atexit_callback
_c_exit
__p___argv
__p___argc
strerror
_exit
_initterm_e
_initterm
_get_initial_narrow_environment
_register_onexit_function
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_errno
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
api-ms-win-crt-heap-l1-1-0
calloc
malloc
realloc
_callnewh
free
_set_new_mode
api-ms-win-crt-filesystem-l1-1-0
_access
remove
_unlink
_fstat64
_stat64
api-ms-win-crt-string-l1-1-0
strncmp
_strdup
isupper
strpbrk
strspn
strcmp
strcspn
tolower
strncpy
api-ms-win-crt-convert-l1-1-0
strtoll
strtoull
strtoul
strtol
atoi
strtod
api-ms-win-crt-stdio-l1-1-0
_pclose
_popen
__p__commode
__stdio_common_vsprintf
_lseeki64
fgets
_set_fmode
__acrt_iob_func
fflush
fread
ftell
_read
fseek
feof
fwrite
_open
__stdio_common_vsscanf
fputs
fopen
fclose
fputc
_close
_write
api-ms-win-crt-locale-l1-1-0
localeconv
_configthreadlocale
api-ms-win-crt-math-l1-1-0
_dclass
__setusermatherr
api-ms-win-crt-time-l1-1-0
_time64
_gmtime64
api-ms-win-crt-utility-l1-1-0
qsort
shell32
ShellExecuteA
Sections
.text Size: 522KB - Virtual size: 521KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ