c:\Users\tom_rus\Documents\Visual Studio 2022\Projects\ida_keygen - Copy\ida_keygen\bin\Release\net6.0\win-x64\native\ida_keygen.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ida_keygen.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ida_keygen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
src/ida_keygen/Program.js
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
src/ida_keygen/Program.js
Resource
win10v2004-20240802-en
General
-
Target
ida_keygen.7z
-
Size
1.6MB
-
MD5
be5aabc0a277765938e286b1ca7ba042
-
SHA1
3c042a53b87ff8e17c95bfd466ccf82634944c13
-
SHA256
80183a407af9b460652d6ea556461685ee952a788a81f4b9ad6dcd398836fbaf
-
SHA512
ba599dcbcc66925e64fba62840e4512197dc4293d259bd6dba8e91a60400b8a5f5b7004a5950bb7f797110b7a4352441a15b85286a90bee821fec45255458705
-
SSDEEP
49152:mbKtBEYgp1FqGDsY1Pgy5ojKFrDyKmGmPVl:mGQYW8WsYN+4KKAVl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/ida_keygen.exe
Files
-
ida_keygen.7z.7z
-
ida_keygen.exe.exe windows:6 windows x64 arch:x64
12cae415cc33d84b99721f605f8bf239
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
EnumerateTraceGuidsEx
EventSetInformation
EventUnregister
RegCloseKey
EventActivityIdControl
EventRegister
EventWriteTransfer
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
EventWrite
EventEnabled
bcrypt
BCryptFinishHash
BCryptGenRandom
BCryptHashData
BCryptOpenAlgorithmProvider
BCryptCloseAlgorithmProvider
BCryptGetProperty
BCryptCreateHash
BCryptDestroyHash
kernel32
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
CompareStringW
CloseThreadpoolIo
SetLastError
ExpandEnvironmentStringsW
GetLastError
GetCurrentProcessId
GetEnvironmentVariableW
MultiByteToWideChar
GetStdHandle
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
LoadLibraryExW
FileTimeToSystemTime
GetSystemTime
GetTickCount64
GetCurrentProcessorNumber
GetCurrentProcess
GetCurrentThread
WaitForSingleObject
Sleep
CreateThreadpoolWork
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
InitializeCriticalSection
InitializeConditionVariable
DeleteCriticalSection
LocalFree
EnterCriticalSection
SleepConditionVariableCS
LeaveCriticalSection
WakeConditionVariable
WaitForMultipleObjectsEx
GetFullPathNameW
GetLongPathNameW
GetProcAddress
LocalAlloc
GetConsoleOutputCP
WideCharToMultiByte
RaiseFailFastException
WaitForThreadpoolWaitCallbacks
CreateThreadpoolIo
StartThreadpoolIo
CancelThreadpoolIo
CreateFileW
DeleteFileW
FlushFileBuffers
FreeLibrary
GetCurrentDirectoryW
GetFileInformationByHandleEx
GetFileType
GetOverlappedResult
ReadFile
SetConsoleCtrlHandler
SetFileInformationByHandle
SetFilePointerEx
SetThreadErrorMode
GetDynamicTimeZoneInformation
GetTimeZoneInformation
WriteFile
CloseHandle
SetEvent
ResetEvent
CreateEventExW
FormatMessageW
CreateThread
ResumeThread
DuplicateHandle
GetThreadPriority
SetThreadPriority
VerSetConditionMask
GetExitCodeProcess
CreateProcessW
OpenProcess
K32EnumProcesses
GetProcessId
CreatePipe
GetCPInfoExW
GetConsoleCP
GetConsoleScreenBufferInfo
GetConsoleMode
ReadConsoleW
SetConsoleTextAttribute
WriteConsoleW
FlushProcessWriteBuffers
GetCurrentThreadId
WaitForSingleObjectEx
VirtualQuery
AddVectoredExceptionHandler
FlsAlloc
FlsGetValue
FlsSetValue
CreateEventW
TerminateProcess
SwitchToThread
SuspendThread
GetThreadContext
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualFree
QueryInformationJobObject
GetModuleHandleExW
GetProcessAffinityMask
InitializeCriticalSectionEx
QueryPerformanceCounter
QueryPerformanceFrequency
GetSystemTimeAsFileTime
DebugBreak
SleepEx
GlobalMemoryStatusEx
GetTickCount
GetLogicalProcessorInformation
GetLogicalProcessorInformationEx
GetLargePageMinimum
VirtualUnlock
GetWriteWatch
ResetWriteWatch
VirtualAllocExNuma
IsProcessInJob
GetNumaHighestNodeNumber
K32GetProcessMemoryInfo
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
InitializeCriticalSectionAndSpinCount
GetModuleHandleW
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleFileNameW
ExitProcess
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
ole32
CoUninitialize
CoTaskMemAlloc
CoGetApartmentType
CoCreateGuid
CoTaskMemFree
CoWaitForMultipleHandles
CoInitializeEx
Exports
Exports
DotNetRuntimeDebugHeader
Sections
.text Size: 470KB - Virtual size: 469KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.managed Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 230KB - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
src/ida_keygen.sln
-
src/ida_keygen/IdaLicense.cs
-
src/ida_keygen/Program.cs.js
-
src/ida_keygen/Properties/PublishProfiles/FolderProfile.pubxml
-
src/ida_keygen/Properties/launchSettings.json
-
src/ida_keygen/ida_keygen.csproj
-
src/nuget.config.xml