replace.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e48c1759830e503810064d1118d898c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e48c1759830e503810064d1118d898c0N.exe
-
Size
589KB
-
MD5
e48c1759830e503810064d1118d898c0
-
SHA1
365cca30fbc02ee727bd7f6e139ecd464020187f
-
SHA256
3389368d1e843b9f5590b0243344423fba146ac181e42c6e821fddb21323cc2f
-
SHA512
a48bc6938ed3ef86cbee7cbd8ef1d9fd01c40285cdb6263367167bbeaf6ece6e82ee83760b46a9a3a8c850903a59ad6a7c7b598fc7a39a895ceb81a989386f2c
-
SSDEEP
12288:BaqzPTY53of4XgbXZqHfdQCaIY//RnhOWrZVoexdqCLH31Ii3Dn:HPYPwbXZq6C7Y/5kWrZVoe/1LH3bDn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e48c1759830e503810064d1118d898c0N.exe
Files
-
e48c1759830e503810064d1118d898c0N.exe.exe windows:10 windows x64 arch:x64
7f915e73eee8f7ca67bd9ba9264315da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetCommandLineW
GetLastError
HeapSetInformation
CopyFileW
GetCurrentProcess
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
msvcrt
_commode
?terminate@@YAXXZ
_XcptFilter
_amsg_exit
__getmainargs
__set_app_type
_exit
_cexit
__setusermatherr
_initterm
_fmode
exit
__C_specific_handler
ulib
?PutSeparators@ARGUMENT_LEXEMIZER@@QEAAXPEBD@Z
?PutMultipleSwitch@ARGUMENT_LEXEMIZER@@QEAAXPEBVWSTRING@@@Z
?DoParsing@ARGUMENT_LEXEMIZER@@QEAAEPEAVARRAY@@@Z
?Initialize@ARGUMENT_LEXEMIZER@@QEAAEPEAVARRAY@@@Z
??1ARGUMENT_LEXEMIZER@@UEAA@XZ
??0ARGUMENT_LEXEMIZER@@QEAA@XZ
?QueryPath@PATH@@QEBAPEAV1@XZ
?QueryFullPath@PATH@@QEBAPEAV1@XZ
?HasWildCard@PATH@@QEBAEXZ
?Initialize@PATH@@QEAAEPEBGE@Z
??0PATH@@QEAA@XZ
?Initialize@WSTRING@@QEAAEPEBGK@Z
?Initialize@WSTRING@@QEAAEPEBDK@Z
?DebugDump@OBJECT@@UEBAXE@Z
?Compare@OBJECT@@UEBAJPEBV1@@Z
??1PATH_ARGUMENT@@UEAA@XZ
?QueryDirectory@SYSTEM@@SAPEAVFSN_DIRECTORY@@PEBVPATH@@E@Z
??1OBJECT@@UEAA@XZ
??MTIMEINFO@@QEBAEV0@@Z
UlibRealloc
?Traverse@FSN_DIRECTORY@@QEBAEPEAXPEAVFSN_FILTER@@PEAVPATH@@P6AE0PEAVFSNODE@@2@Z@Z
?Initialize@PATH_ARGUMENT@@QEAAEPEADE@Z
??0PROGRAM@@IEAA@XZ
?ValidateVersion@PROGRAM@@UEBAXKK@Z
?Usage@PROGRAM@@UEBAXXZ
?PutSwitches@ARGUMENT_LEXEMIZER@@QEAAXPEBVWSTRING@@@Z
?GetStandardOutput@PROGRAM@@UEAAPEAVSTREAM@@XZ
?GetStandardInput@PROGRAM@@UEAAPEAVSTREAM@@XZ
?Fatal@PROGRAM@@UEBAXXZ
?Fatal@PROGRAM@@UEBAXKKPEADZZ
?DisplayMessage@PROGRAM@@UEBAEKW4MESSAGE_TYPE@@@Z
?DisplayMessage@PROGRAM@@UEBAEKW4MESSAGE_TYPE@@PEADZZ
??1PROGRAM@@UEAA@XZ
?Initialize@PROGRAM@@QEAAEKKK@Z
?Initialize@CLASS_DESCRIPTOR@@QEAAEPEBD@Z
??0CLASS_DESCRIPTOR@@QEAA@XZ
?SetAttributes@FSNODE@@QEAAEKPEAK@Z
?GotABreak@KEYBOARD@@SAEXZ
?EnableLineMode@KEYBOARD@@QEAAEXZ
?EnableBreakHandling@KEYBOARD@@SAEXZ
?DisableLineMode@KEYBOARD@@QEAAEXZ
?Initialize@KEYBOARD@@QEAAEEE@Z
??0KEYBOARD@@QEAA@XZ
?TruncateBase@PATH@@QEAAEXZ
?AppendBase@PATH@@QEAAEPEBVWSTRING@@E@Z
?Initialize@PATH@@QEAAEPEBV1@E@Z
?SetAttributes@FSN_FILTER@@QEAAEKKK@Z
?SetFileName@FSN_FILTER@@QEAAEPEBVWSTRING@@@Z
?Initialize@FSN_FILTER@@QEAAEXZ
??1FSN_FILTER@@UEAA@XZ
??0FSN_FILTER@@QEAA@XZ
?QueryWSTR@WSTRING@@QEBAPEAGKKPEAGKE@Z
?QueryString@WSTRING@@QEBAPEAV1@KK@Z
??0FLAG_ARGUMENT@@QEAA@XZ
?QueryInvalidArgument@ARGUMENT_LEXEMIZER@@QEAAPEAVWSTRING@@XZ
?PrepareToParse@ARGUMENT_LEXEMIZER@@QEAAEPEAVWSTRING@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QEAAXE@Z
?IsValueSet@ARGUMENT@@QEAAEXZ
?QueryFile@SYSTEM@@SAPEAVFSN_FILE@@PEBVPATH@@EPEAE@Z
?GetStandardError@PROGRAM@@UEAAPEAVSTREAM@@XZ
?Initialize@FLAG_ARGUMENT@@QEAAEPEAVWSTRING@@@Z
??0ARRAY@@QEAA@XZ
??1ARRAY@@UEAA@XZ
?Initialize@ARRAY@@QEAAEKK@Z
?Put@ARRAY@@UEAAEPEAVOBJECT@@@Z
??0DSTRING@@QEAA@XZ
??1DSTRING@@UEAA@XZ
??0PATH_ARGUMENT@@QEAA@XZ
?QueryFsnodeArray@FSN_DIRECTORY@@QEBAPEAVARRAY@@PEAVFSN_FILTER@@@Z
??1PATH@@UEAA@XZ
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlFreeHeap
RtlAllocateHeap
RtlVirtualUnwind
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE