uuidgen.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c7e55cce888240aa6a4b7d0410ca7600N.exe
Resource
win10v2004-20240709-en
General
-
Target
c7e55cce888240aa6a4b7d0410ca7600N.exe
-
Size
1.2MB
-
MD5
c7e55cce888240aa6a4b7d0410ca7600
-
SHA1
b1a09d1417264271afd892601f31ff01fa5dff0c
-
SHA256
fb4157b695e163530f205f7cb485e5fe179d694a4b06e4834174cae044d5708a
-
SHA512
cb73f0f6e1b3742f375797d8cce2c2fc594ed2304b66a5b074d38a34753c8e24921ae0a39c4bda8b85e875c347cc461f178ff238b959c5ebbf0ad15dde9af978
-
SSDEEP
12288:/OFjHjVOfSCuBn+1V4mlzEFQyYVgwvPNaMvwaQDR6q79LRgRljjL:/0Djsf9nz4mloFQnpXUMPQDR6q79dA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7e55cce888240aa6a4b7d0410ca7600N.exe
Files
-
c7e55cce888240aa6a4b7d0410ca7600N.exe.exe windows:10 windows x86 arch:x86
299d39b9d943eb2028b75348f605fc5d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
GetProcAddress
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
GetCurrentProcess
msvcrt
__setusermatherr
_initterm
?terminate@@YAXXZ
__p__commode
__p__fmode
_XcptFilter
_cexit
_exit
__set_app_type
__getmainargs
_except_handler4_common
_vsnprintf
toupper
atoi
fprintf
fopen
exit
_amsg_exit
_controlfp
__iob_func
rpcrt4
UuidCreateSequential
UuidToStringA
RpcStringFreeA
UuidCreate
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE