C:\Users\Administrator\Desktop\Armora Exclusive V2\Armora Exclusive V2\examples\example_win32_directx11\Release\𝗔𝗗𝗡𝗩𝗡𝗫 𝗦𝗧𝗢𝗥𝗘.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f21f5315ab01339bc24347a988802acfc743fe0e0cda3897a3c6739ae080f1d3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f21f5315ab01339bc24347a988802acfc743fe0e0cda3897a3c6739ae080f1d3.exe
Resource
win10v2004-20240802-en
General
-
Target
f21f5315ab01339bc24347a988802acfc743fe0e0cda3897a3c6739ae080f1d3
-
Size
1.2MB
-
MD5
70c22cba44d3bb7fd12e4db1ae87910a
-
SHA1
5ea5d8491b71927e95a426ec50fbe29f84493549
-
SHA256
f21f5315ab01339bc24347a988802acfc743fe0e0cda3897a3c6739ae080f1d3
-
SHA512
078e731a750c1624294ec1dc2493ea7beeea48479666f4ca1286cde3e293fc660e21b1cbce36fd917dab2b7c4caca7afd7bb0d054e52a2e69832b247a0f61270
-
SSDEEP
24576:xI05JJ5TW8w7FDVsdmcStNWC5C+8msnZAFb:xt53I82Rdh3/V81n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f21f5315ab01339bc24347a988802acfc743fe0e0cda3897a3c6739ae080f1d3
Files
-
f21f5315ab01339bc24347a988802acfc743fe0e0cda3897a3c6739ae080f1d3.exe windows:6 windows x64 arch:x64
a208f80bee8ae0f7d1036d6d7007433f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
d3d11
D3D11CreateDeviceAndSwapChain
d3dcompiler_43
D3DCompile
ole32
CoCreateInstance
CoUninitialize
CoInitialize
kernel32
GetFileInformationByHandleEx
GetFileAttributesExW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
FindFirstFileW
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
FindClose
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
QueryPerformanceCounter
FreeLibrary
VerSetConditionMask
GetProcAddress
QueryPerformanceFrequency
LoadLibraryA
ReadProcessMemory
Process32First
VirtualAllocEx
Beep
GetThreadContext
CheckRemoteDebuggerPresent
GetModuleHandleA
GlobalUnlock
WideCharToMultiByte
VirtualProtectEx
VirtualQueryEx
IsDebuggerPresent
AllocConsole
VirtualFreeEx
GetLocaleInfoEx
GetFileSizeEx
CreateFileA
WaitForMultipleObjects
PeekNamedPipe
ReadFile
GetFileType
GetStdHandle
GetEnvironmentVariableA
WaitForSingleObjectEx
MoveFileExA
VerifyVersionInfoA
GetSystemDirectoryA
SleepEx
LeaveCriticalSection
EnterCriticalSection
LocalFree
FormatMessageA
SetLastError
QueryFullProcessImageNameW
GetModuleHandleW
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
VirtualProtect
DeleteCriticalSection
InitializeCriticalSectionEx
CreateThread
GetSystemInfo
CloseHandle
Process32Next
GetCurrentThread
GetLastError
Sleep
CreateToolhelp32Snapshot
OpenProcess
ReleaseMutex
WaitForSingleObject
CreateMutexA
TerminateProcess
VirtualAlloc
OutputDebugStringA
GetCurrentProcess
GetProcessHeap
GlobalLock
GlobalFree
GlobalAlloc
MultiByteToWideChar
CreateFileW
AreFileApisANSI
GetTickCount
HeapSize
HeapDestroy
HeapAlloc
WriteProcessMemory
CreateRemoteThread
HeapReAlloc
HeapFree
user32
SetCursorPos
ReleaseCapture
IsWindowUnicode
GetCursorPos
CloseClipboard
SetCapture
GetForegroundWindow
TrackMouseEvent
EmptyClipboard
GetClipboardData
GetClientRect
OpenClipboard
DispatchMessageA
GetWindowRect
DestroyWindow
SetClipboardData
SetCursor
LoadCursorA
ClientToScreen
GetKeyState
UpdateWindow
FindWindowA
PostQuitMessage
PeekMessageA
LoadIconA
TranslateMessage
ScreenToClient
SetLayeredWindowAttributes
DefWindowProcA
MoveWindow
MessageBoxA
SetWindowDisplayAffinity
GetWindowLongA
SetWindowLongA
GetAsyncKeyState
GetCapture
ShowWindow
SetWindowRgn
CreateWindowExW
GetSystemMetrics
UnregisterClassW
RegisterClassExW
GetActiveWindow
gdi32
CreateRoundRectRgn
advapi32
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
CryptReleaseContext
CryptAcquireContextA
ConvertSidToStringSidA
CopySid
SetSecurityInfo
OpenProcessToken
IsValidSid
InitializeAcl
GetTokenInformation
GetLengthSid
AddAccessAllowedAce
CryptGenRandom
shell32
ShellExecuteA
msvcp140
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Xlength_error@std@@YAXPEBD@Z
_Query_perf_frequency
?_Throw_Cpp_error@std@@YAXH@Z
?uncaught_exceptions@std@@YAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Xout_of_range@std@@YAXPEBD@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Winerror_map@std@@YAHH@Z
?_Syserror_map@std@@YAPEBDH@Z
_Cnd_do_broadcast_at_thread_exit
_Query_perf_counter
_Thrd_detach
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z
?_Xbad_function_call@std@@YAXXZ
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?good@ios_base@std@@QEBA_NXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
imm32
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmReleaseContext
ImmGetContext
dwmapi
DwmExtendFrameIntoClientArea
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
ZwReadVirtualMemory
RtlVirtualUnwind
NtRaiseHardError
RtlAdjustPrivilege
urlmon
URLDownloadToFileA
normaliz
IdnToAscii
wldap32
ord143
ord217
ord46
ord211
ord60
ord45
ord50
ord41
ord22
ord26
ord27
ord32
ord33
ord35
ord79
ord30
ord200
ord301
crypt32
CertFreeCertificateChain
CertOpenStore
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
ws2_32
WSACleanup
closesocket
recv
send
WSAGetLastError
bind
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
socket
WSASetLastError
WSAIoctl
WSAStartup
freeaddrinfo
accept
htonl
ntohl
gethostname
sendto
recvfrom
listen
getaddrinfo
select
__WSAFDIsSet
ioctlsocket
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception_context
__current_exception
strrchr
memset
memmove
memcpy
memcmp
strchr
strstr
__std_terminate
__std_exception_copy
__std_exception_destroy
__C_specific_handler
memchr
_CxxThrowException
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
_set_fmode
_lseeki64
fread
fclose
__stdio_common_vsscanf
__p__commode
feof
fflush
fputs
fopen
_wfopen
__acrt_iob_func
_read
_write
_close
_open
_popen
_pclose
fgets
__stdio_common_vfprintf
ftell
fseek
fputc
fwrite
api-ms-win-crt-utility-l1-1-0
rand
qsort
api-ms-win-crt-string-l1-1-0
_stricmp
_strdup
strncmp
strncpy
tolower
strpbrk
strcmp
strcspn
strspn
isupper
api-ms-win-crt-heap-l1-1-0
calloc
realloc
_set_new_mode
malloc
free
_callnewh
_msize
api-ms-win-crt-runtime-l1-1-0
_beginthreadex
terminate
__sys_nerr
_errno
strerror
exit
_invalid_parameter_noinfo
_resetstkoflw
_invalid_parameter_noinfo_noreturn
_wassert
_register_thread_local_exe_atexit_callback
_c_exit
_getpid
_exit
_initterm_e
_initterm
_get_narrow_winmain_command_line
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
abort
system
api-ms-win-crt-convert-l1-1-0
strtoull
strtoul
atoi
strtol
strtod
strtoll
api-ms-win-crt-multibyte-l1-1-0
_mbsicmp
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-locale-l1-1-0
localeconv
_configthreadlocale
___lc_codepage_func
api-ms-win-crt-math-l1-1-0
_dclass
acosf
__setusermatherr
ceilf
cosf
fmodf
powf
sinf
sqrtf
api-ms-win-crt-time-l1-1-0
_gmtime64
_time64
api-ms-win-crt-filesystem-l1-1-0
_access
_stat64
_fstat64
_unlink
Sections
.text Size: 719KB - Virtual size: 718KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 310KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ