F:\ZharkBot v2\Release\AntiAnalysisTest.pdb
Static task
static1
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
test.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
test.exe
Resource
win11-20240508-en
General
-
Target
test.exe
-
Size
78KB
-
MD5
37e3386cd608f10a8a1110af1b06c7df
-
SHA1
06b294eb8ddaceebb475b0e4726efdd41808b511
-
SHA256
cb24f26c4137223f7f59ad0f6f20fe02c78757bf79a90cbb79dbe64db31d581d
-
SHA512
f403bcb7d00a3eea4475639c1dd219364377fb075d7d5b46f97e479b0d5042999b42b002e17735efa9f0080163d06627cc38b2622eb4fb73598fd19f4fd334c5
-
SSDEEP
1536:6JfSxaxHggx1VHVx8g7p4pGFq5crM0Gl293DXf142e8SSUw:4fSxaxHTx1VHVx8g7oGFccw0GMR142eC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource test.exe
Files
-
test.exe.exe windows:6 windows x86 arch:x86
359c693e4d6a8b528ab9bd020f947bf5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetComputerNameA
Sleep
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetModuleHandleW
UnhandledExceptionFilter
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
msvcp140
_Strcoll
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
?tolower@?$ctype@D@std@@QBEPBDPADPBD@Z
?_Xlength_error@std@@YAXPBD@Z
??1facet@locale@std@@MAE@XZ
??0facet@locale@std@@IAE@I@Z
?_Decref@facet@locale@std@@UAEPAV_Facet_base@3@XZ
?_Incref@facet@locale@std@@UAEXXZ
??Bid@locale@std@@QAEIXZ
?_Getcoll@_Locinfo@std@@QBE?AU_Collvec@@XZ
??1_Locinfo@std@@QAE@XZ
??0_Locinfo@std@@QAE@PBD@Z
?id@?$collate@D@std@@2V0locale@2@A
_Strxfrm
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?_Init@locale@std@@CAPAV_Locimp@12@_N@Z
?uncaught_exception@std@@YA_NXZ
?_Xbad_alloc@std@@YAXXZ
?_Xregex_error@std@@YAXW4error_type@regex_constants@1@@Z
?id@?$ctype@D@std@@2V0locale@2@A
?tolower@?$ctype@D@std@@QBEDD@Z
vcruntime140
_except_handler4_common
memset
__current_exception_context
__current_exception
memchr
strchr
__std_terminate
__std_exception_copy
__std_exception_destroy
__CxxFrameHandler3
_CxxThrowException
memcpy
memmove
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
realloc
free
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_crt_atexit
_cexit
_register_thread_local_exe_atexit_callback
exit
_initialize_onexit_table
__p___argv
_controlfp_s
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_c_exit
_set_app_type
_seh_filter_exe
__p___argc
_exit
_invalid_parameter_noinfo_noreturn
terminate
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ