C:\_Program\MFC_Study\CommandDemo\Debug\CommandDemo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1c2781d01ff716e357235c01ff2a6337a63fa980cc930fe9504d942240def508.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1c2781d01ff716e357235c01ff2a6337a63fa980cc930fe9504d942240def508.exe
Resource
win10v2004-20240704-en
General
-
Target
1c2781d01ff716e357235c01ff2a6337a63fa980cc930fe9504d942240def508
-
Size
233KB
-
MD5
7262b05def0e99e09f0c7b670500a835
-
SHA1
7f4f9ef16fc440d47fa1a68c9c14b9372a6dbd5d
-
SHA256
1c2781d01ff716e357235c01ff2a6337a63fa980cc930fe9504d942240def508
-
SHA512
04d21b9cc226487a5b45a87c191acf34794a3e4a15b9bb865cd319f97ee4ead0f25f38740172b47c8961c5fbef1e4fa858f3a1f01fa98cbb1312a3a28ebac2bb
-
SSDEEP
3072:hN64AAgJjuzuzCB7d+IYpWP4GKVmF/pstBaDqwONnct437Bl3N2ULrs9:hNGJj3ChtVymF/p/uwONct43j92UPk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c2781d01ff716e357235c01ff2a6337a63fa980cc930fe9504d942240def508
Files
-
1c2781d01ff716e357235c01ff2a6337a63fa980cc930fe9504d942240def508.exe windows:6 windows x86 arch:x86
b884f7d3e5e4dd4306fff265de959dc4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mfc140ud
ord14241
ord14245
ord16316
ord3857
ord12887
ord8456
ord4739
ord3089
ord5393
ord10763
ord17181
ord13868
ord4477
ord14049
ord10945
ord13645
ord13644
ord6832
ord12115
ord12111
ord12113
ord12114
ord12112
ord17378
ord9876
ord12081
ord3899
ord3902
ord3752
ord3751
ord4017
ord4016
ord4759
ord12304
ord13299
ord12901
ord10840
ord1223
ord2928
ord5037
ord11018
ord3312
ord16160
ord7547
ord14092
ord14183
ord14233
ord9885
ord14215
ord7198
ord4493
ord391
ord1183
ord10202
ord16367
ord15450
ord7728
ord17261
ord7729
ord17262
ord7727
ord17260
ord9592
ord14599
ord17050
ord2136
ord13920
ord13921
ord2379
ord13968
ord14222
ord9533
ord15117
ord4757
ord4819
ord11212
ord17188
ord9511
ord17182
ord14609
ord14610
ord2887
ord6470
ord10024
ord5352
ord9589
ord15030
ord15098
ord12265
ord14223
ord10108
ord3024
ord5153
ord10210
ord1039
ord2686
ord2693
ord2708
ord2564
ord1225
ord7941
ord493
ord14137
ord11044
ord8269
ord1096
ord1607
ord5502
ord10201
ord3361
ord15177
ord13820
ord16756
ord10773
ord11016
ord10220
ord16863
ord14723
ord9012
ord1645
ord2520
ord4490
ord10008
ord8632
ord512
ord16570
ord16260
ord3426
ord2026
ord16119
ord6776
ord7520
ord10884
ord4504
ord12860
ord12910
ord13168
ord11005
ord14944
ord6741
ord14715
ord13153
ord10123
ord9168
ord3410
ord15618
ord3092
ord14475
ord14808
ord5624
ord11301
ord3257
ord15134
ord14054
ord5044
ord1978
ord1240
ord4805
ord4755
ord17099
ord6495
ord6485
ord12263
ord12077
ord12564
ord13028
ord13029
ord11177
ord13664
ord11797
ord11020
ord6996
ord11975
ord11976
ord9160
ord9896
ord11065
ord14184
ord3313
ord16164
ord7549
ord8943
ord1090
ord4797
ord10000
ord13177
ord13180
ord11326
ord11341
ord11331
ord11804
ord11809
ord11343
ord13008
ord12341
ord10721
ord10711
ord13667
ord13036
ord11868
ord1601
ord5152
ord3023
ord3219
ord8289
ord11034
ord14084
ord14048
ord9016
ord8649
ord550
ord3763
ord10126
ord5992
ord5993
ord7426
ord14518
ord2045
ord7224
ord16090
ord16100
ord7229
ord16098
ord7228
ord5268
ord4685
ord3088
ord5392
ord13333
ord7251
ord10618
ord11166
ord1266
ord2942
ord5057
ord9875
ord11021
ord13721
ord13716
ord6486
ord14141
ord4483
ord5499
ord14063
ord11046
ord14041
ord13398
ord12231
ord11115
ord2687
ord5266
ord1060
ord15974
ord1579
ord1078
ord10216
ord1592
ord2012
ord2033
ord5894
ord5961
ord5906
ord5924
ord5918
ord5912
ord5971
ord5955
ord5900
ord5977
ord5932
ord5870
ord5885
ord5946
ord5405
ord7021
ord11511
ord5391
ord3635
ord17183
ord9512
ord17189
ord8290
ord13636
ord16776
ord17154
ord16093
ord7225
ord3220
ord14085
ord4596
ord3976
ord3977
ord3856
ord14132
ord6303
ord6711
ord6991
ord11164
ord6679
ord6994
ord6306
ord6537
ord6282
ord9264
ord9265
ord9254
ord6535
ord9889
ord12076
ord11017
ord2935
ord2000
ord1176
ord15341
ord1662
ord1652
ord1660
ord9006
ord9164
ord11977
ord11973
ord11970
ord9928
ord2616
ord1653
ord2804
kernel32
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
RaiseException
GetProcessHeap
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DecodePointer
SetLastError
HeapSize
OutputDebugStringW
DeleteCriticalSection
OutputDebugStringA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeLibrary
VirtualQuery
TerminateProcess
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
CloseHandle
LoadLibraryW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetLastError
user32
UnregisterClassW
PostQuitMessage
PeekMessageW
gdi32
DeleteDC
comctl32
InitCommonControlsEx
oleaut32
SysFreeString
gdiplus
GdiplusShutdown
vcruntime140d
memset
__CxxFrameHandler3
__vcrt_InitializeCriticalSectionEx
_except_handler4_common
__std_type_info_destroy_list
__vcrt_GetModuleFileNameW
__vcrt_GetModuleHandleW
__vcrt_LoadLibraryExW
memmove
_purecall
ucrtbased
__stdio_common_vswprintf_s
__stdio_common_vsnwprintf_s
free
malloc
_CrtDbgReport
_CrtDbgReportW
_seh_filter_exe
_set_app_type
__setusermatherr
_configure_wide_argv
_initialize_wide_environment
_get_wide_winmain_command_line
_initterm
_initterm_e
exit
_exit
_set_fmode
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
terminate
_controlfp_s
__stdio_common_vsprintf_s
_wmakepath_s
_wsplitpath_s
_invalid_parameter_noinfo
_errno
_recalloc
wcslen
wcscpy_s
__stdio_common_vswprintf
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 409B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ