C:\Users\anybody\Desktop\AntiReflectCodeProtector_src\bin\ReflectProtected\ReflectProtectedApp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
271aadb7635ae185786e789a011d0845c4ba31432461ed692047bb91dcad94a0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
271aadb7635ae185786e789a011d0845c4ba31432461ed692047bb91dcad94a0.exe
Resource
win10v2004-20240508-en
General
-
Target
271aadb7635ae185786e789a011d0845c4ba31432461ed692047bb91dcad94a0
-
Size
933KB
-
MD5
a3bb5f1758e5a16daac68d5c3c36c9fa
-
SHA1
f14014b89bca2b30969b76d0c20302b8a3d62cff
-
SHA256
271aadb7635ae185786e789a011d0845c4ba31432461ed692047bb91dcad94a0
-
SHA512
913b284a760b1d0c923f9a8aafd3b3db94a336785dd59cccabe6f290f3f2a823198d558ea700e373e3f0baed6886e8c36b5d2e915c4625315bbc15ec9d1e511c
-
SSDEEP
12288:kd0S+xzarxnNXkGg2/MLfl6+r0iqwGBoAMZDRL+AMZDRL:kdY+FNXjgRqaA2L+A2L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 271aadb7635ae185786e789a011d0845c4ba31432461ed692047bb91dcad94a0
Files
-
271aadb7635ae185786e789a011d0845c4ba31432461ed692047bb91dcad94a0.exe windows:6 windows x86 arch:x86
26037403fab85b2620fa5e82ea9389b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
wsprintfW
msvcr120d
__crtTerminateProcess
?terminate@@YAXXZ
__crtSetUnhandledExceptionFilter
_lock
_unlock
_calloc_dbg
__dllonexit
_onexit
_invoke_watson
__crtUnhandledException
_except_handler4_common
wcscpy_s
_wmakepath_s
_wsplitpath_s
_CxxThrowException
malloc
free
_crt_debugger_hook
??1type_info@@UAE@XZ
_commode
_fmode
_wcmdln
_initterm
_initterm_e
__setusermatherr
_configthreadlocale
_cexit
_exit
exit
_CrtSetCheckCount
_CrtDbgReportW
__set_app_type
__wgetmainargs
_amsg_exit
__crtGetShowWindowMode
_XcptFilter
_CRT_RTC_INITW
__CxxFrameHandler3
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
_controlfp_s
wcslen
mscoree
CLRCreateInstance
CorBindToRuntimeEx
kernel32
IsDebuggerPresent
lstrlenW
LocalFree
lstrlenA
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
DecodePointer
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryExW
GetProcAddress
GetLastError
RaiseException
EncodePointer
ole32
CoInitializeEx
oleaut32
VariantChangeType
SysAllocString
SysFreeString
SafeArrayCreate
SafeArrayDestroy
SafeArrayPutElement
GetErrorInfo
VariantClear
VariantInit
CreateErrorInfo
SetErrorInfo
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 578KB - Virtual size: 578KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 282KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ