I:\Code\MWMT\source\DumpIt\DumpIt\Release\DumpIt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
file.0x842e3820.0x842e2008.ImageSectionObject.DumpIt.exe
Resource
win11-20240704-en
General
-
Target
file.0x842e3820.0x842e2008.ImageSectionObject.DumpIt.exe.img
-
Size
195KB
-
MD5
3d6af86df0c25deca91fb0de7c88de6c
-
SHA1
6d4383b50495c5a0fccddd3af0b417d5eca97f4a
-
SHA256
2ee41dfa8b536e17c3715f648bf2087ba872335513a773714a577dad54aa8819
-
SHA512
e51b33f6076fc4ee8e34d293dc3ea41b099a3fa8438893a3d526c7f8aad6cee1cbec52769e3144cdc8b131d75453fc69cc66d628fed6f964c3ff7176b2a3a293
-
SSDEEP
1536:426vZqGgxTydR/Kf+cb8bzAHe37XL6XQPPRrMwr9vIWaN63tc1K98YzSmpxQHzG9:4Vvgi/r6UblrMw5w8dp8YzSUKgTCZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource file.0x842e3820.0x842e2008.ImageSectionObject.DumpIt.exe.img
Files
-
file.0x842e3820.0x842e2008.ImageSectionObject.DumpIt.exe.img.exe windows:5 windows x86 arch:x86
43113498b8b20f2c980e4c01b8a5839d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemWow64DirectoryW
CreateFileW
GetStdHandle
GetLastError
GetCurrentDirectoryW
GetProcAddress
GetDiskFreeSpaceW
SizeofResource
LockResource
DeviceIoControl
CloseHandle
DeleteFileW
GetSystemTime
ExpandEnvironmentStringsW
LoadLibraryW
GetSystemDirectoryW
WriteFile
GetModuleHandleW
GetComputerNameW
GetCurrentProcess
SetConsoleTextAttribute
LoadResource
FindResourceW
GetConsoleScreenBufferInfo
GetFullPathNameW
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
GetCommandLineA
HeapSetInformation
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
ExitProcess
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
MultiByteToWideChar
RtlUnwind
WriteConsoleW
SetStdHandle
LCMapStringW
GetStringTypeW
HeapReAlloc
IsProcessorFeaturePresent
FlushFileBuffers
ReadFile
HeapSize
advapi32
RegCloseKey
AdjustTokenPrivileges
CheckTokenMembership
RegOpenKeyExW
FreeSid
AllocateAndInitializeSid
LookupPrivilegeValueW
RegCreateKeyExA
OpenProcessToken
RegSetValueExW
shlwapi
SHDeleteKeyW
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ