D:\source\repos\No Escape\Release\No Escape.pdb
Static task
static1
Behavioral task
behavioral1
Sample
No Escape.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
No Escape.exe
Resource
win10v2004-20240802-en
General
-
Target
No Escape.exe
-
Size
1.0MB
-
MD5
cdbb54a3ec888c3eac84deaa408f7b8a
-
SHA1
4478842748db03e2e3879ac6a3854a82e30c845d
-
SHA256
cccc326adf56026fa3e5efba505a6f51c091d7362b8cd68b322d301300aa6615
-
SHA512
2abc533172ae2024fcde9fa8b407256e5341593c70912e42020ea7fe2b1d195b586039703c0b7e24964061bfbfb3a352fa8e7e158a53e50fa142397a594739d4
-
SSDEEP
12288:jZnnL32CPdWMpJsCaa7xGBW1Sg6edbjquhl0EQA5z:jZD2yWMsCaaFQWvdnqVWz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource No Escape.exe
Files
-
No Escape.exe.exe windows:6 windows x86 arch:x86
Password: fghgfhfgh
a63dc554ad18bdeb875e9043ac873b7e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateThread
LoadLibraryA
Process32FirstW
CloseHandle
CreateThread
GetProcAddress
ExitProcess
GetCurrentProcessId
GetSystemTime
CreateFileA
Process32NextW
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CopyFileA
Sleep
CreateToolhelp32Snapshot
SetFileAttributesW
OpenProcess
GetModuleHandleA
TerminateProcess
GetSystemDirectoryA
WriteFile
GetCurrentProcess
lstrcmpiW
GetModuleFileNameA
user32
GetWindowThreadProcessId
FindWindowExW
GetWindowRect
GetDC
IsWindowVisible
GetWindowDC
GetSystemMetrics
ShowWindow
GetAsyncKeyState
ExitWindowsEx
MessageBoxA
BlockInput
EnumWindows
SendMessageW
FindWindowW
ReleaseDC
SetForegroundWindow
GetDesktopWindow
SystemParametersInfoW
FindWindowA
UpdateWindow
gdi32
SelectObject
BitBlt
CreateSolidBrush
advapi32
RegSetValueExA
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyExW
OpenProcessToken
LookupPrivilegeValueW
RegSetValueExW
RegCreateKeyExA
shell32
ShellExecuteW
ShellExecuteA
msvcp140
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?always_noconv@codecvt_base@std@@QBE_NXZ
??Bid@locale@std@@QAEIXZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@H@Z
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?uncaught_exception@std@@YA_NXZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z
?_Xlength_error@std@@YAXPBD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z
ntdll
RtlAdjustPrivilege
NtSetInformationProcess
vcruntime140
__current_exception_context
memset
_except_handler4_common
_CxxThrowException
__std_terminate
__std_exception_copy
__std_exception_destroy
__CxxFrameHandler3
__current_exception
memcpy
memmove
api-ms-win-crt-stdio-l1-1-0
__p__commode
fgetc
ungetc
_set_fmode
_fseeki64
setvbuf
fputc
fopen
fgetpos
fsetpos
fwrite
_get_stream_buffer_pointers
__stdio_common_vfprintf
__acrt_iob_func
fclose
fflush
fread
api-ms-win-crt-string-l1-1-0
_wcsicmp
api-ms-win-crt-utility-l1-1-0
rand
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_unlock_file
api-ms-win-crt-runtime-l1-1-0
_exit
_seh_filter_exe
_set_app_type
_invalid_parameter_noinfo_noreturn
_configure_narrow_argv
_initialize_narrow_environment
_get_narrow_winmain_command_line
_initterm
_initterm_e
exit
terminate
_controlfp_s
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_register_onexit_function
_crt_atexit
_initialize_onexit_table
api-ms-win-crt-heap-l1-1-0
malloc
free
_callnewh
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 988KB - Virtual size: 989KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ