D:\Projects\MouriNaruto\NSudoPrivate\Source\Native\Output\Binaries\Release\Win32\NSudoLG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
666f5a1ecd234534d28fa9b7db1ef40889fe3698ecc18d64034246cf4e8055cf.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
666f5a1ecd234534d28fa9b7db1ef40889fe3698ecc18d64034246cf4e8055cf.exe
Resource
win10v2004-20240802-en
General
-
Target
666f5a1ecd234534d28fa9b7db1ef40889fe3698ecc18d64034246cf4e8055cf
-
Size
212KB
-
MD5
71a06fd5e3973ad44f92064a8ac2ab76
-
SHA1
e3c90b6c6c4e59468e0717992e4dacd4207fb13b
-
SHA256
666f5a1ecd234534d28fa9b7db1ef40889fe3698ecc18d64034246cf4e8055cf
-
SHA512
411a25fca596d73faa1a232b728d0ca0d5108556e13e4907813bf146e0c226f911b7aca849c16f9989fbae3e5e2156be8cad05162c2b1cb74d7dd19225312470
-
SSDEEP
3072:ptnPFA8qgEvyY9n1RUTLtCtwxz2Q8QuA6337p52lQBV+UdE+rECWp7hKqog3e:pvA8qgEnATGnQuA6bXBV+UdvrEFp7hKp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 666f5a1ecd234534d28fa9b7db1ef40889fe3698ecc18d64034246cf4e8055cf
Files
-
666f5a1ecd234534d28fa9b7db1ef40889fe3698ecc18d64034246cf4e8055cf.exe windows:6 windows x86 arch:x86
26df042bd9a6c1d26d9e14b38449f7f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateEventW
MultiByteToWideChar
GetTickCount64
LockResource
QueryPerformanceFrequency
FindResourceExW
LoadResource
GetOverlappedResult
GetProcAddress
VerSetConditionMask
FreeLibrary
SleepEx
VerifyVersionInfoW
QueryPerformanceCounter
LoadLibraryExW
SetPriorityClass
GetCurrentProcess
OpenProcess
WaitForSingleObjectEx
GetLocalTime
GetCurrentProcessId
GetModuleHandleExW
ExitProcess
Sleep
TerminateProcess
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetModuleFileNameW
InitializeCriticalSection
ExpandEnvironmentStringsW
GetFileInformationByHandleEx
SizeofResource
ReadFile
MulDiv
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
CloseHandle
GetThreadUILanguage
GetLastError
GetCurrentThreadId
GetFileAttributesW
CreateFileW
InitializeCriticalSectionEx
LeaveCriticalSection
SetThreadUILanguage
GetCommandLineW
EnterCriticalSection
SetLastError
ResumeThread
HeapFree
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
user32
SetWindowTextW
EndDialog
SendMessageW
GetWindowTextW
EndPaint
BeginPaint
DialogBoxParamW
GetClientRect
LoadImageW
SetWindowLongW
LoadIconW
ChangeWindowMessageFilter
DestroyIcon
UnregisterClassW
MonitorFromWindow
GetDC
GetDlgItem
DrawIconEx
gdi32
DeleteDC
GetDeviceCaps
comdlg32
GetOpenFileNameW
advapi32
LookupPrivilegeValueW
SetThreadToken
CreateProcessAsUserW
AdjustTokenPrivileges
GetAce
CloseServiceHandle
OpenSCManagerW
SetTokenInformation
AllocateAndInitializeSid
IsWellKnownSid
AddAce
OpenProcessToken
CreateRestrictedToken
FreeSid
StartServiceW
InitializeAcl
OpenServiceW
GetLengthSid
DuplicateTokenEx
AddAccessAllowedAce
QueryServiceStatusEx
GetTokenInformation
shell32
DragFinish
DragQueryFileW
ole32
CoInitializeEx
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wtsapi32
WTSEnumerateSessionsW
WTSQueryUserToken
WTSFreeMemory
WTSEnumerateProcessesW
msvcrt
_amsg_exit
_except_handler4_common
__wgetmainargs
memset
_controlfp_s
memmove
__DestructExceptionObject
_msize
__set_app_type
_wcmdln
abort
___mb_cur_max_func
_errno
?terminate@@YAXXZ
_XcptFilter
realloc
__p__commode
_CxxThrowException
_set_fmode
_initterm_e
_initterm
??0exception@@QAE@ABQBD@Z
_wcsnicmp
wcsstr
malloc
wcsrchr
free
strncmp
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??2@YAPAXI@Z
_wcsicmp
__CxxFrameHandler3
??3@YAXPAX@Z
__setusermatherr
memcpy
__pctype_func
tolower
wcstol
_mbtowc_l
wcsnlen
localeconv
strrchr
strcpy_s
_CIlog10
_ftol2_sse
ceil
_clearfp
??0exception@@QAE@ABV0@@Z
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ