C:\Users\Hesa\Downloads\New folder\KreYzeSpoofer\obj\x64\Release\HelloWorld.pdb
Static task
static1
Behavioral task
behavioral1
Sample
HelloWorld.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HelloWorld.exe
Resource
win10v2004-20240704-en
General
-
Target
HelloWorld.exe
-
Size
7KB
-
MD5
49c2a5c1da65a4675aa0067c04a87bc1
-
SHA1
9fe6b2e84fd3bcd3430d40fc49813169d0a1f664
-
SHA256
fb7bd6a14998878484ffa18f14c4dfa579d753d9fcaa3921f952a279fb91f9b9
-
SHA512
9cfe9e8e373a5a67a6547562d56334dfacfed91d8e48521653d46f53cf56982076c30fba999905c7d961adca4a57b468bc140a304e264c9b354ae1c1de47a262
-
SSDEEP
96:lnpXUY5+lcY3WNtW1jYcFKNVcz1W4oKYMsLYUa:lpXUYicY8stYcFwVc03KY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HelloWorld.exe
Files
-
HelloWorld.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ