C:\Users\akil\Documents\Malware_Project\malware_sample_experiments\Win32.Fungus\MSVC\Release\fungus.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7f0b83a92c0eb11f9b2f5f14fa43d6e4666d76eb64a02705ee73d711cecf4300.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7f0b83a92c0eb11f9b2f5f14fa43d6e4666d76eb64a02705ee73d711cecf4300.exe
Resource
win10v2004-20240802-en
General
-
Target
7f0b83a92c0eb11f9b2f5f14fa43d6e4666d76eb64a02705ee73d711cecf4300
-
Size
21KB
-
MD5
c2f4d39b408081e24e545b458102a6b4
-
SHA1
34050cfb0cbefbe2664adc525ab97b274169cd6c
-
SHA256
7f0b83a92c0eb11f9b2f5f14fa43d6e4666d76eb64a02705ee73d711cecf4300
-
SHA512
bf6ee543900bb55eb0bfbf8007067a8560a442dc9da1159b59e4636234a2bf88b5bf3cf8230c9d5c82f35f4bb1d2082cdf189ae73d9bb9c1b441cf9b003e67c2
-
SSDEEP
384:cl6lgdr6CyGQ/4jKn/sfJfjxvJQbQAxd5Hq9eNeMN+:clKgdnbQQen/KDecE5HaeD+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7f0b83a92c0eb11f9b2f5f14fa43d6e4666d76eb64a02705ee73d711cecf4300
Files
-
7f0b83a92c0eb11f9b2f5f14fa43d6e4666d76eb64a02705ee73d711cecf4300.exe windows:6 windows x86 arch:x86
d95480add111946737f27127b04df6ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ReleaseMutex
CreateMutexA
Sleep
CreateThread
GetTickCount
SetFileAttributesA
GetLastError
SetErrorMode
GetModuleFileNameA
OpenMutexA
CopyFileA
CreateProcessA
CreateFileA
DeleteFileA
WriteFile
lstrcpynA
lstrcpyA
lstrcatA
lstrlenA
GetDriveTypeA
GetLogicalDriveStringsA
WaitForSingleObject
GetVersionExA
GetLocaleInfoA
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
ExitThread
ExitProcess
CloseHandle
GetTempPathA
GetStartupInfoW
CreateDirectoryA
GetModuleHandleW
GetCurrentProcess
TerminateProcess
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
UnhandledExceptionFilter
user32
CharLowerA
FindWindowA
advapi32
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
GetUserNameA
RegDeleteValueA
ws2_32
inet_addr
gethostbyname
WSAStartup
closesocket
connect
htons
recv
send
socket
WSACleanup
select
vcruntime140
strrchr
strstr
__current_exception_context
strchr
memmove
_except_handler4_common
__current_exception
memset
api-ms-win-crt-string-l1-1-0
strtok
strncmp
strncpy
_stricmp
api-ms-win-crt-stdio-l1-1-0
fwrite
_set_fmode
__stdio_common_vsprintf
fclose
__p__commode
fopen
api-ms-win-crt-utility-l1-1-0
rand
srand
api-ms-win-crt-convert-l1-1-0
atoi
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
api-ms-win-crt-runtime-l1-1-0
_seh_filter_exe
_c_exit
_register_thread_local_exe_atexit_callback
_get_narrow_winmain_command_line
_initialize_narrow_environment
_configure_narrow_argv
_exit
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_controlfp_s
terminate
exit
_initterm_e
_initterm
_set_app_type
_cexit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ