D:\nJUFUdfds\ConsoleApp1\Opim1\bin\Release\net8.0\win-x64\native\Opim1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
72a6b9761489f09d37caf0514be2ae6c.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
72a6b9761489f09d37caf0514be2ae6c.exe
Resource
win10v2004-20240709-en
General
-
Target
72a6b9761489f09d37caf0514be2ae6c.exe
-
Size
2.7MB
-
MD5
72a6b9761489f09d37caf0514be2ae6c
-
SHA1
e73f3f0b1be9a67c0774f8e34a332a6943ca72b2
-
SHA256
2fc9b003bd366cf7c6899e244851ba2a6a9c2d53024025c77d55e54ad19174f0
-
SHA512
7d742b2edb6280c450d3184d7956e473cec5201b05730ef41cc0311b9c93e80d84fc59a252b8026aa3eb69dd8673469cd47ef5a620e8971fa1ad0cc5b46aecaf
-
SSDEEP
49152:f/4TQu+xEaJT+0X6XInlN0rKOWN8O3b0/3GhiIAzPL1aqN:VeI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72a6b9761489f09d37caf0514be2ae6c.exe
Files
-
72a6b9761489f09d37caf0514be2ae6c.exe.exe windows:6 windows x64 arch:x64
6c037551546a39bac9b6d1bf5a5d2960
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
DuplicateTokenEx
OpenThreadToken
RevertToSelf
ImpersonateLoggedOnUser
CheckTokenMembership
bcrypt
BCryptGenRandom
iphlpapi
GetNetworkParams
GetPerAdapterInfo
GetAdaptersAddresses
kernel32
TlsSetValue
TlsFree
SetLastError
FormatMessageW
GetLastError
ExitProcess
GetCPInfoExW
GetConsoleMode
GetFileType
WriteFile
WriteConsoleW
GetConsoleOutputCP
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
GetExitCodeProcess
CreateProcessW
OpenProcess
K32EnumProcesses
GetProcessId
DuplicateHandle
QueryFullProcessImageNameW
CreatePipe
GetCurrentProcess
GetConsoleCP
CloseThreadpoolIo
RaiseFailFastException
GetTickCount64
GetCurrentThread
WaitForSingleObject
Sleep
DeleteCriticalSection
LocalFree
EnterCriticalSection
SleepConditionVariableCS
LeaveCriticalSection
WakeConditionVariable
QueryPerformanceCounter
InitializeCriticalSection
InitializeConditionVariable
WaitForMultipleObjectsEx
CreateThreadpoolWait
SetThreadpoolWait
WaitForThreadpoolWaitCallbacks
CloseThreadpoolWait
CreateThreadpoolWork
CloseThreadpoolWork
SubmitThreadpoolWork
QueryPerformanceFrequency
GetFullPathNameW
GetLongPathNameW
LocalAlloc
GetProcAddress
CreateIoCompletionPort
CreateDirectoryW
CreateFileW
CreateThreadpoolIo
StartThreadpoolIo
CancelThreadpoolIo
DeleteFileW
DeviceIoControl
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FlushFileBuffers
FreeLibrary
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandleEx
GetModuleFileNameW
GetOverlappedResult
GetSystemDirectoryW
LoadLibraryExW
SetFileAttributesW
SetFileInformationByHandle
SetFilePointerEx
SetThreadErrorMode
CreateThread
ResumeThread
GetThreadPriority
SetThreadPriority
GetCurrentProcessorNumberEx
SetEvent
ResetEvent
CreateEventExW
GetEnvironmentVariableW
FlushProcessWriteBuffers
WaitForSingleObjectEx
RtlVirtualUnwind
RtlCaptureContext
RtlRestoreContext
AddVectoredExceptionHandler
FlsAlloc
FlsGetValue
FlsSetValue
CreateEventW
TerminateProcess
SwitchToThread
GetCurrentThreadId
SuspendThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
QueryInformationJobObject
GetModuleHandleW
GetModuleHandleExW
GetProcessAffinityMask
InitializeContext
GetEnabledXStateFeatures
SetXStateFeaturesMask
VirtualQuery
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
DebugBreak
SleepEx
GlobalMemoryStatusEx
GetSystemInfo
GetLogicalProcessorInformation
GetLogicalProcessorInformationEx
GetLargePageMinimum
VirtualUnlock
VirtualAllocExNuma
IsProcessInJob
GetNumaHighestNodeNumber
GetProcessGroupAffinity
K32GetProcessMemoryInfo
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlLookupFunctionEntry
InitializeSListHead
GetCurrentProcessId
ole32
CoInitializeEx
CoUninitialize
CoCreateGuid
CoTaskMemFree
CoWaitForMultipleHandles
CoTaskMemAlloc
CoGetApartmentType
api-ms-win-crt-heap-l1-1-0
calloc
malloc
_set_new_mode
_callnewh
free
api-ms-win-crt-math-l1-1-0
ceil
__setusermatherr
api-ms-win-crt-string-l1-1-0
wcsncmp
strcmp
strcpy_s
_stricmp
api-ms-win-crt-convert-l1-1-0
strtoull
api-ms-win-crt-runtime-l1-1-0
abort
_initialize_onexit_table
_get_initial_wide_environment
terminate
_seh_filter_exe
_set_app_type
_configure_wide_argv
_initialize_wide_environment
_crt_atexit
_initterm
_initterm_e
exit
_exit
__p___argc
__p___wargv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_register_onexit_function
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Exports
Exports
DotNetRuntimeDebugHeader
Sections
.text Size: 405KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.managed Size: 781KB - Virtual size: 781KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
hydrated Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ