D:\Projects\MouriNaruto\NSudoPrivate\Source\Native\Output\Binaries\Release\Win32\NSudoLG.pdb
Static task
static1
Behavioral task
behavioral1
Sample
869fded2dade293bb36604071b0ad30a333f6d34957b45c14980d7d2a0d7fac1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
869fded2dade293bb36604071b0ad30a333f6d34957b45c14980d7d2a0d7fac1.exe
Resource
win10v2004-20240802-en
General
-
Target
869fded2dade293bb36604071b0ad30a333f6d34957b45c14980d7d2a0d7fac1
-
Size
212KB
-
MD5
cbc8a5e05b524d730474bc321ebbe267
-
SHA1
2da6a6df7a5909c064e0520b9c91b5b7a0fd7bf7
-
SHA256
869fded2dade293bb36604071b0ad30a333f6d34957b45c14980d7d2a0d7fac1
-
SHA512
4bf15dd815c4c063f8055babdc85b93055bfd4b555e8d6e1cd70b46493db13d4e4780ea175abc23b61782e72e31430558a57532c4e404a6beeb73678782de33c
-
SSDEEP
3072:ptmmEvEY9n1RUTLtCtwxz2Q8QuA6337p52lQBV+UdE+rECWp7hK56+W:pgmElATGnQuA6bXBV+UdvrEFp7hK5M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 869fded2dade293bb36604071b0ad30a333f6d34957b45c14980d7d2a0d7fac1
Files
-
869fded2dade293bb36604071b0ad30a333f6d34957b45c14980d7d2a0d7fac1.exe windows:6 windows x86 arch:x86
26df042bd9a6c1d26d9e14b38449f7f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateEventW
MultiByteToWideChar
GetTickCount64
LockResource
QueryPerformanceFrequency
FindResourceExW
LoadResource
GetOverlappedResult
GetProcAddress
VerSetConditionMask
FreeLibrary
SleepEx
VerifyVersionInfoW
QueryPerformanceCounter
LoadLibraryExW
SetPriorityClass
GetCurrentProcess
OpenProcess
WaitForSingleObjectEx
GetLocalTime
GetCurrentProcessId
GetModuleHandleExW
ExitProcess
Sleep
TerminateProcess
OutputDebugStringW
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
EncodePointer
InitializeSListHead
GetSystemTimeAsFileTime
GetModuleFileNameW
InitializeCriticalSection
ExpandEnvironmentStringsW
GetFileInformationByHandleEx
SizeofResource
ReadFile
MulDiv
GetModuleHandleW
GetProcessHeap
DeleteCriticalSection
DecodePointer
HeapAlloc
RaiseException
CloseHandle
GetThreadUILanguage
GetLastError
GetCurrentThreadId
GetFileAttributesW
CreateFileW
InitializeCriticalSectionEx
LeaveCriticalSection
SetThreadUILanguage
GetCommandLineW
EnterCriticalSection
SetLastError
ResumeThread
HeapFree
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
user32
SetWindowTextW
EndDialog
SendMessageW
GetWindowTextW
EndPaint
BeginPaint
DialogBoxParamW
GetClientRect
LoadImageW
SetWindowLongW
LoadIconW
ChangeWindowMessageFilter
DestroyIcon
UnregisterClassW
MonitorFromWindow
GetDC
GetDlgItem
DrawIconEx
gdi32
DeleteDC
GetDeviceCaps
comdlg32
GetOpenFileNameW
advapi32
LookupPrivilegeValueW
SetThreadToken
CreateProcessAsUserW
AdjustTokenPrivileges
GetAce
CloseServiceHandle
OpenSCManagerW
SetTokenInformation
AllocateAndInitializeSid
IsWellKnownSid
AddAce
OpenProcessToken
CreateRestrictedToken
FreeSid
StartServiceW
InitializeAcl
OpenServiceW
GetLengthSid
DuplicateTokenEx
AddAccessAllowedAce
QueryServiceStatusEx
GetTokenInformation
shell32
DragFinish
DragQueryFileW
ole32
CoInitializeEx
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wtsapi32
WTSEnumerateSessionsW
WTSQueryUserToken
WTSFreeMemory
WTSEnumerateProcessesW
msvcrt
_amsg_exit
_except_handler4_common
__wgetmainargs
memset
_controlfp_s
memmove
__DestructExceptionObject
_msize
__set_app_type
_wcmdln
abort
___mb_cur_max_func
_errno
?terminate@@YAXXZ
_XcptFilter
realloc
__p__commode
_CxxThrowException
_set_fmode
_initterm_e
_initterm
??0exception@@QAE@ABQBD@Z
_wcsnicmp
wcsstr
malloc
wcsrchr
free
strncmp
??1exception@@UAE@XZ
?what@exception@@UBEPBDXZ
??2@YAPAXI@Z
_wcsicmp
__CxxFrameHandler3
??3@YAXPAX@Z
__setusermatherr
memcpy
__pctype_func
tolower
wcstol
_mbtowc_l
wcsnlen
localeconv
strrchr
strcpy_s
_CIlog10
_ftol2_sse
ceil
_clearfp
??0exception@@QAE@ABV0@@Z
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ