C:\code\LoadAgent\x64\Debug\LoadAgent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8c2ddc211b3fc3bd1130b83139d3bb8cbee3b56b8a841386e09a5cf44b38bbbc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c2ddc211b3fc3bd1130b83139d3bb8cbee3b56b8a841386e09a5cf44b38bbbc.exe
Resource
win10v2004-20240802-en
General
-
Target
8c2ddc211b3fc3bd1130b83139d3bb8cbee3b56b8a841386e09a5cf44b38bbbc
-
Size
2.7MB
-
MD5
4e8dce6d1ba0bcec59006c832a38fcbd
-
SHA1
1c1133754c254fb4dd25375f64a175057d2b828c
-
SHA256
8c2ddc211b3fc3bd1130b83139d3bb8cbee3b56b8a841386e09a5cf44b38bbbc
-
SHA512
52f9e8bd8fb90e378ec676538be8e2b3e6215971f112c88cb3b7f00421bad32dc93f2596f792bae1037ee3928a53f0ada91bd7af1aa00bfcc40ed78be4da2211
-
SSDEEP
49152:AJcLvPjoPdYghSsHn5WPp4ezRg1pRRRrGypJ:tnn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c2ddc211b3fc3bd1130b83139d3bb8cbee3b56b8a841386e09a5cf44b38bbbc
Files
-
8c2ddc211b3fc3bd1130b83139d3bb8cbee3b56b8a841386e09a5cf44b38bbbc.exe windows:6 windows x64 arch:x64
759b1993812ff98acc56f358416cdd9b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
imm32
ImmGetDescriptionW
user32
GetDesktopWindow
GetKeyboardLayout
GetWindowThreadProcessId
kernel32
SetEndOfFile
CreateFileW
SetStdHandle
SetEnvironmentVariableW
VirtualAlloc
MapViewOfFile
GetModuleFileNameA
CreateFileMappingA
GetTempPathW
GetProcAddress
LoadLibraryW
EnumSystemLocalesA
GetUserDefaultLocaleName
GetSystemDefaultLocaleName
QueryPerformanceCounter
QueryPerformanceFrequency
FormatMessageA
WideCharToMultiByte
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
SetFileInformationByHandle
InitOnceExecuteOnce
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetModuleHandleW
GetFileInformationByHandleEx
CreateSymbolicLinkW
LocalFree
GetLocaleInfoEx
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
CompareStringEx
GetCPInfo
GetCurrentThreadId
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
GetCurrentProcessId
InitializeSListHead
GetStartupInfoW
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
FreeEnvironmentStringsW
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
ExitProcess
GetStdHandle
GetFileType
WriteConsoleW
HeapSize
HeapValidate
GetSystemInfo
WriteFile
GetCommandLineA
GetCommandLineW
GetCurrentThread
OutputDebugStringW
SetConsoleCtrlHandler
HeapReAlloc
HeapQueryInformation
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CloseHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
DeleteFileW
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
RtlUnwind
Sections
.textbss Size: - Virtual size: 1000KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 440KB - Virtual size: 439KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1024B - Virtual size: 990B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ