idapyswitch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
idapyswitch.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
idapyswitch.exe
Resource
win10v2004-20240611-en
General
-
Target
idapyswitch.exe
-
Size
74KB
-
MD5
8650f16e26c33faeabfe55fac7a5d3f6
-
SHA1
b358449f67842fd423ecedf240ee8b1394933c9e
-
SHA256
08f37844a40979d91c9f0a2466c42f47460fc9bba540ede2ca438a2782a98511
-
SHA512
d6828e846a3797ed6c0872ba0b8d44d79c8b0a1c8bc48046b07a0f9f73aeacdcdde94c2ab2873a6f189eeb6c8d39df2b03d3cc59b6631df0bcf5a5c412fa5f22
-
SSDEEP
1536:TFA9bsWRThIqs3JroXAzmtkODff/LQqsk2+Soot5x+rgkxFO:JA9bsOCMwWDnL2+g5wrgCF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource idapyswitch.exe
Files
-
idapyswitch.exe.exe windows:6 windows x64 arch:x64
033852c8bbb504d99f034941ff74f04e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
advapi32
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
kernel32
GetCurrentProcess
GetCurrentProcessId
InitializeSListHead
SetUnhandledExceptionFilter
ResetEvent
IsProcessorFeaturePresent
GetLastError
IsDebuggerPresent
QueryPerformanceCounter
ExitProcess
GetSystemTimeAsFileTime
FormatMessageW
GetFileAttributesW
MultiByteToWideChar
GetProcAddress
GetModuleFileNameW
CloseHandle
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
TerminateProcess
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
SetEvent
UnhandledExceptionFilter
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
vcruntime140
strrchr
__std_exception_destroy
__std_terminate
strstr
__CxxFrameHandler3
memcpy
memmove
memset
__std_exception_copy
__C_specific_handler
strchr
_CxxThrowException
_purecall
api-ms-win-crt-string-l1-1-0
_strnicmp
strncmp
strcmp
isdigit
tolower
_stricmp
api-ms-win-crt-convert-l1-1-0
_atoi64
api-ms-win-crt-stdio-l1-1-0
fgets
_wfsopen
__acrt_iob_func
__stdio_common_vfprintf
__p__commode
__stdio_common_vsprintf
__stdio_common_vsnprintf_s
__stdio_common_vsscanf
fwrite
_ftelli64
_fseeki64
fread
feof
fclose
_set_fmode
api-ms-win-crt-runtime-l1-1-0
_c_exit
terminate
__p___argc
_exit
_initterm_e
__p___argv
_register_thread_local_exe_atexit_callback
_initterm
_get_initial_narrow_environment
exit
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
strerror_s
_errno
api-ms-win-crt-time-l1-1-0
_localtime64_s
api-ms-win-crt-heap-l1-1-0
_set_new_mode
_callnewh
malloc
free
realloc
api-ms-win-crt-environment-l1-1-0
_dupenv_s
api-ms-win-crt-filesystem-l1-1-0
_findclose
_wunlink
_wfindfirst64
_wfindnext64
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ