C:\Users\Bakkes\Documents\repositories\bakkesmod-patch-master\target\release\deps\bakkesmod_patch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bakkesmod-patch.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
bakkesmod-patch.exe
Resource
win10v2004-20240508-en
General
-
Target
bakkesmod-patch.exe
-
Size
2.2MB
-
MD5
70808566413a9e0f96496381af7b120e
-
SHA1
ce2c7b84771523c96e387d21265dadb8e3f479af
-
SHA256
34706ef576f97be93a917d80ec8952521020ada1b481aac23525c13c620bfe72
-
SHA512
a5f7404de27407cdd3488c52046ff49c628356b7f6caab4fab3fee4dd0b424351c601fe08ea0e8bf7544c19329c0c07e123a6e8bcf24f8596fb1f6f2cdc4dfc4
-
SSDEEP
49152:N+4jKAHfOOko1bSqKC/y9KB+L9znaE2OxV7x9:hjgOk3cl2xV7x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bakkesmod-patch.exe
Files
-
bakkesmod-patch.exe.exe windows:6 windows x64 arch:x64
b3cf6fce12a3aca90163c7e1cf9ca4e8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
send
WSAGetLastError
getaddrinfo
recv
freeaddrinfo
WSAStartup
WSACleanup
WSASocketW
connect
closesocket
kernel32
InitializeSListHead
GetCurrentThreadId
GetCurrentProcessId
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
HeapFree
GetProcessHeap
HeapAlloc
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetLastError
ReleaseSRWLockExclusive
ReleaseMutex
RtlLookupFunctionEntry
AcquireSRWLockExclusive
GetCurrentProcess
GetCurrentThread
RtlCaptureContext
WaitForSingleObjectEx
LoadLibraryA
GetProcAddress
CreateMutexA
CloseHandle
ReadFile
Sleep
CopyFileExW
GetSystemTimeAsFileTime
GetStdHandle
GetConsoleMode
GetFileInformationByHandleEx
HeapReAlloc
SetUnhandledExceptionFilter
LeaveCriticalSection
SetLastError
ReadConsoleW
QueryPerformanceCounter
GetModuleHandleA
TlsGetValue
TlsSetValue
AcquireSRWLockShared
ReleaseSRWLockShared
GetEnvironmentVariableW
GetCurrentDirectoryW
WriteFile
WriteConsoleW
GetModuleHandleW
FormatMessageW
GetCommandLineW
GetModuleFileNameW
CreateFileW
GetFileInformationByHandle
DeviceIoControl
GetFullPathNameW
SetFilePointerEx
CreateDirectoryW
InitializeCriticalSection
ExitProcess
TryEnterCriticalSection
SetHandleInformation
CreateFileA
SetConsoleMode
lstrlenW
IsProcessorFeaturePresent
SetConsoleCursorPosition
FillConsoleOutputCharacterW
FillConsoleOutputAttribute
SetConsoleTextAttribute
EnterCriticalSection
GetConsoleScreenBufferInfo
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
SystemFunction036
bcrypt
BCryptGenRandom
ole32
CoTaskMemFree
shell32
SHGetKnownFolderPath
vcruntime140
__current_exception
_CxxThrowException
memset
__current_exception_context
__C_specific_handler
memcmp
memcpy
__CxxFrameHandler3
memmove
api-ms-win-crt-runtime-l1-1-0
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
_exit
exit
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_initterm_e
_seh_filter_exe
__p___argc
_set_app_type
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 895KB - Virtual size: 895KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ