C:\Users\DevelopUser\Desktop\Develop\Rust\RustStudy\target\release\deps\RustStudy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e6c9cf2a5d8421bae02141ea0732169b6db9676837f49e8a137f40e8aa65402d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e6c9cf2a5d8421bae02141ea0732169b6db9676837f49e8a137f40e8aa65402d.exe
Resource
win10v2004-20240802-en
General
-
Target
e6c9cf2a5d8421bae02141ea0732169b6db9676837f49e8a137f40e8aa65402d.exe
-
Size
5.2MB
-
MD5
976bccc61d3d33b978c458113a4fe8c7
-
SHA1
530c00b758d8b9700c6d816b0b477b9010a8eb0a
-
SHA256
e6c9cf2a5d8421bae02141ea0732169b6db9676837f49e8a137f40e8aa65402d
-
SHA512
cc53dfd6b543fb72fd35ef86f8f04955fd0023dd49f6f4ec5d7b3723029b9cff99935819e5c317e2ca6df932eef45d6bf4c5966e1b37f781557a777238aaf4ac
-
SSDEEP
98304:nk49OOOOOOBOOOOOOOOOODOOOOOOOOOOAgFOV++n8:lOOOOOOBOOOOOOOOOODOOOOOOOOOOAgD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6c9cf2a5d8421bae02141ea0732169b6db9676837f49e8a137f40e8aa65402d.exe
Files
-
e6c9cf2a5d8421bae02141ea0732169b6db9676837f49e8a137f40e8aa65402d.exe.exe windows:6 windows x64 arch:x64
77c81a65158cc479f65a7ef9984bcb40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SetHandleInformation
CreateDirectoryW
GetFullPathNameW
SetFileInformationByHandle
CreateFileW
GetModuleFileNameW
GetEnvironmentVariableW
GetCurrentProcess
GetCurrentProcessId
FormatMessageW
GetFileInformationByHandle
GetModuleHandleW
CreateThread
ExitProcess
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
GetCurrentDirectoryW
RtlCaptureContext
RtlLookupFunctionEntry
CreateMutexA
WaitForSingleObjectEx
LoadLibraryA
ReleaseMutex
GetFileInformationByHandleEx
AcquireSRWLockShared
ReleaseSRWLockShared
Sleep
SetWaitableTimer
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
TerminateProcess
CreateProcessW
CreateWaitableTimerExW
SetLastError
WriteConsoleW
MultiByteToWideChar
FindFirstFileW
GetCurrentThreadId
WaitForSingleObject
InitializeSListHead
GetConsoleMode
GetStdHandle
TryAcquireSRWLockExclusive
GetCurrentThread
GetProcAddress
GetModuleHandleA
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
LoadLibraryExA
FreeLibrary
RtlVirtualUnwind
HeapReAlloc
GetProcessHeap
HeapAlloc
SetThreadStackGuarantee
FindClose
AddVectoredExceptionHandler
GetLastError
SetCurrentDirectoryW
CloseHandle
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
IsProcessorFeaturePresent
ws2_32
select
send
ioctlsocket
WSADuplicateSocketW
getsockname
getpeername
WSASend
WSARecv
recv
setsockopt
getsockopt
WSASocketW
freeaddrinfo
WSACleanup
WSAStartup
getaddrinfo
bind
accept
closesocket
WSAGetLastError
listen
connect
advapi32
RegOpenKeyExW
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
RegCloseKey
RegQueryValueExW
SystemFunction036
bcrypt
BCryptGenRandom
ntdll
RtlNtStatusToDosError
NtWriteFile
user32
MessageBoxW
ole32
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
oleaut32
VariantInit
SysStringLen
SafeArrayPutElement
SafeArrayCreate
VariantClear
SysFreeString
SysAllocStringLen
GetErrorInfo
vcruntime140
memmove
memset
memcmp
__CxxFrameHandler3
memcpy
_CxxThrowException
__C_specific_handler
__current_exception_context
__current_exception
api-ms-win-crt-runtime-l1-1-0
_initterm_e
exit
_exit
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_initterm
_set_app_type
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_seh_filter_exe
_get_initial_narrow_environment
_configure_narrow_argv
_initialize_narrow_environment
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 876KB - Virtual size: 876KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ