C:\Users\risaa\Desktop\Lab 4&5\Lab 5B\Debug\Lab 5B.pdb
Static task
static1
Behavioral task
behavioral1
Sample
13bf3ee69145e0f00d702ffed07364a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13bf3ee69145e0f00d702ffed07364a0N.exe
Resource
win10v2004-20240709-en
General
-
Target
13bf3ee69145e0f00d702ffed07364a0N.exe
-
Size
34KB
-
MD5
13bf3ee69145e0f00d702ffed07364a0
-
SHA1
47e8f8bd01af86104653f3b847ddaa9f062b0698
-
SHA256
0089907658937936f01c6a38c6207ce21aa93b99ceff7b5a9641f58cbb518199
-
SHA512
f36688efa2183ef23b081373a8018246a23b951b1fb24965883b1b2edd5e65e67ea81f1a14a37c5a2e650e8473b5202063537858fb0d71628a5ff3d47492758f
-
SSDEEP
384:xKFKxHDenvcbQxq8LIRgM1WrfrSC61Up+oHI41stisYpETb/vgjOCt:BAkWLIWM1krSCPBHI41qYp+b0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13bf3ee69145e0f00d702ffed07364a0N.exe
Files
-
13bf3ee69145e0f00d702ffed07364a0N.exe.exe windows:6 windows x86 arch:x86
e40580ae872e91bf95df0592b9df6902
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr120d
_initterm
__initenv
_fmode
_commode
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
?terminate@@YAXXZ
__crtSetUnhandledExceptionFilter
_initterm_e
_unlock
_calloc_dbg
__dllonexit
_onexit
_invoke_watson
_controlfp_s
_except_handler4_common
wcscpy_s
_wmakepath_s
_wsplitpath_s
__setusermatherr
_configthreadlocale
_cexit
_exit
exit
_CrtSetCheckCount
_CrtDbgReportW
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
_CRT_RTC_INITW
strlen
strcmp
strcpy
malloc
free
printf
fscanf
fopen
_lock
fclose
kernel32
GetModuleFileNameW
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
DecodePointer
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryExW
GetProcAddress
GetLastError
RaiseException
IsDebuggerPresent
EncodePointer
GetModuleHandleW
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ