D:\a\MetaHookSv\MetaHookSv\Release\MetaHook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9e93df76b0371c0cc9b5a33e4a65182ce09c74ca7df3ea671c3d35648de1584a.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9e93df76b0371c0cc9b5a33e4a65182ce09c74ca7df3ea671c3d35648de1584a.exe
Resource
win10v2004-20240802-en
General
-
Target
9e93df76b0371c0cc9b5a33e4a65182ce09c74ca7df3ea671c3d35648de1584a
-
Size
1.8MB
-
MD5
2ea86c4466b87ff72399c5a17ff1b2d9
-
SHA1
08f7863ec55b90a819a0b926ce2e5b80b6c426e2
-
SHA256
9e93df76b0371c0cc9b5a33e4a65182ce09c74ca7df3ea671c3d35648de1584a
-
SHA512
81c4b4c9ef6ce981e5991bda3ac41530f6af85d10a5c08ec5c363084adead4f538d9f04c48ec9396ef14d670be3fee30effcc4f5164c45504aa367fb8eb48013
-
SSDEEP
12288:ispyvvn4ZjWt5EmWr9fL42ZE7+i6jolvAgt4B4e/CNFyn86eOl:8REVBL41ai/A04Ge/kFy86eOl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9e93df76b0371c0cc9b5a33e4a65182ce09c74ca7df3ea671c3d35648de1584a
Files
-
9e93df76b0371c0cc9b5a33e4a65182ce09c74ca7df3ea671c3d35648de1584a.exe windows:6 windows x86 arch:x86
cd60fb45d2092fef19fdcc633dba14f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntdll
RtlUnwind
RtlImageNtHeader
NtTerminateProcess
kernel32
FreeLibrary
VirtualProtect
VirtualFree
GetCurrentProcess
VirtualAlloc
GetCurrentThreadId
GetLastError
CloseHandle
FlushInstructionCache
VirtualQuery
SetLastError
GetModuleHandleW
LoadLibraryExW
GetModuleHandleA
GetProcAddress
CreateMutexA
WaitForSingleObject
ReleaseMutex
GetCommandLineA
ExitProcess
GetCurrentProcessId
GetEnvironmentVariableA
MultiByteToWideChar
LocalFree
SetEnvironmentVariableA
FormatMessageA
IsBadReadPtr
IsDebuggerPresent
GetModuleFileNameA
GetLongPathNameA
SetStdHandle
LoadLibraryA
CreateFileW
HeapSize
SetEndOfFile
LeaveCriticalSection
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
TryAcquireSRWLockExclusive
WideCharToMultiByte
EnterCriticalSection
WriteConsoleW
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapAlloc
HeapFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineW
user32
wsprintfA
MessageBoxA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
ws2_32
WSAStartup
WSACleanup
Exports
Exports
CreateInterface
Sections
.text Size: 297KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 176KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ