C:\Users\Nazar\source\repos\RemoteControl\x64\Release\RemoteControl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
68fae1260076d3bb69def54c6a1829e71fb6714b897cff526d8ab17cb54bcff9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
68fae1260076d3bb69def54c6a1829e71fb6714b897cff526d8ab17cb54bcff9.exe
Resource
win10v2004-20240708-en
General
-
Target
18088132987.zip
-
Size
29KB
-
MD5
eb51156f8a9c0e0182ff8d92d00ac502
-
SHA1
0a060a8393427d09e9e7561ec3805f43c228fac2
-
SHA256
5bae4b0d3f2dfe18e6661864d8551b45a3a0c50557fa51dbaca4a5528fdf2ceb
-
SHA512
5606d68762b207656bf58159d95ae7a7b413fdf17f292324be441666b11c0c178499886d0a204606ada9a768a2b24e2f23e85142897a0c25c561de4dfa36e0cc
-
SSDEEP
768:Bc7XJ2lgbDRBNO1GSGk6Lt68Cqe+pGcYkn9kjYKxP:25agbDRBPS98ZUcYknq3xP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/68fae1260076d3bb69def54c6a1829e71fb6714b897cff526d8ab17cb54bcff9
Files
-
18088132987.zip.zip
Password: infected
-
68fae1260076d3bb69def54c6a1829e71fb6714b897cff526d8ab17cb54bcff9.exe windows:6 windows x64 arch:x64
Password: infected
aab0673fdad3ab5280522270c9adcbb2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
HeapSize
MultiByteToWideChar
Sleep
GetLastError
GetFileAttributesA
LockResource
HeapReAlloc
CreateThread
FindResourceExW
LoadResource
FindResourceW
FindClose
HeapDestroy
DeleteCriticalSection
GetProcessHeap
GetConsoleWindow
CreateDirectoryA
OutputDebugStringW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
InitializeCriticalSectionEx
LeaveCriticalSection
FindNextFileA
EnterCriticalSection
HeapFree
FindFirstFileA
HeapAlloc
SizeofResource
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
user32
GetDC
GetSystemMetrics
ShowWindow
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteObject
GetObjectA
BitBlt
shell32
ShellExecuteA
ws2_32
socket
recv
htons
send
inet_addr
WSAStartup
connect
msvcp140
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?eof@ios_base@std@@QEBA_NXZ
?good@ios_base@std@@QEBA_NXZ
?always_noconv@codecvt_base@std@@QEBA_NXZ
??Bid@locale@std@@QEAA_KXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
shlwapi
PathFindExtensionW
PathFindExtensionA
gdiplus
GdipCreateBitmapFromScan0
GdipSaveImageToFile
GdipGetImageEncoders
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
GdiplusStartup
GdipGetImageEncodersSize
GdipDisposeImage
urlmon
URLDownloadToFileA
winhttp
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpOpen
WinHttpReceiveResponse
WinHttpConnect
WinHttpSendRequest
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcpy
memcmp
_CxxThrowException
__current_exception_context
__current_exception
memset
memmove
__std_terminate
__std_exception_copy
__std_exception_destroy
__C_specific_handler
api-ms-win-crt-runtime-l1-1-0
_resetstkoflw
system
_invalid_parameter_noinfo
terminate
_configure_narrow_argv
_errno
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_seh_filter_exe
_set_app_type
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
_invalid_parameter_noinfo_noreturn
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
api-ms-win-crt-string-l1-1-0
wcscspn
_wcsicmp
wcsspn
wmemcpy_s
api-ms-win-crt-stdio-l1-1-0
__p__commode
fflush
_set_fmode
fclose
fgetc
_get_stream_buffer_pointers
_fseeki64
fread
fsetpos
ungetc
setvbuf
fputc
fgetpos
fwrite
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
_recalloc
calloc
_set_new_mode
free
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
_lock_file
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ