C:\Users\Eva01\source\repos\Stage3v1\x64\Release\Stage3v1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6.exe
Resource
win10v2004-20240802-en
General
-
Target
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6.exe
-
Size
9.1MB
-
MD5
05faaa16e93b89eac5f58ca9d7bb0530
-
SHA1
289ceb53db0cd28e259d398df04eebfe62563dcd
-
SHA256
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6
-
SHA512
f371bb76f4718f54e4485b5bcc5df49fa25afcf4d7da0af4a96ab3ffd4e3d818e2093eb0c946613f4c9028e3269b9c8e843f5ee59dc85e7209e9c3b4079b1254
-
SSDEEP
196608:EdBFFhL/RErGO/zcepY3EDhKRuJZYYE1H/0zRS:MBFFhL/RErGO4eMJ4JZY/Mz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6.exe
Files
-
a48e4c9ca04b69eef5063ee39170dbf7fb5d2647c4a27b988e28ad52c24aedb6.exe.exe windows:6 windows x64 arch:x64
66c1cb718b19e3497acdbd564fbb4792
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ws2_32
send
WSACloseEvent
getsockopt
gethostname
ioctlsocket
getpeername
sendto
recvfrom
freeaddrinfo
getaddrinfo
recv
listen
htonl
getsockname
connect
bind
accept
select
__WSAFDIsSet
socket
htons
WSAIoctl
setsockopt
WSACleanup
WSAStartup
ntohs
WSAGetLastError
WSASetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
wldap32
ord217
ord46
ord211
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord41
ord50
ord45
ord60
ord143
crypt32
CertOpenStore
CertEnumCertificatesInStore
CertFreeCertificateChain
CertGetCertificateChain
CertFreeCertificateChainEngine
CertCreateCertificateChainEngine
CryptQueryObject
CertGetNameStringA
CertFindExtension
CertAddCertificateContextToStore
CryptDecodeObjectEx
PFXImportCertStore
CryptStringToBinaryA
CertFreeCertificateContext
CertFindCertificateInStore
CertCloseStore
normaliz
IdnToUnicode
IdnToAscii
advapi32
GetTokenInformation
RegOpenKeyExW
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
RegCreateKeyExW
RegSetValueExW
RegCloseKey
OpenProcessToken
iphlpapi
GetAdaptersInfo
wininet
InternetCloseHandle
InternetOpenW
InternetOpenUrlW
kernel32
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
GetCommandLineW
GetCommandLineA
WriteFile
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
HeapAlloc
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FlushFileBuffers
HeapFree
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileAttributesExW
HeapReAlloc
SetStdHandle
TlsFree
TlsSetValue
TlsGetValue
SetEndOfFile
GetCurrentDirectoryW
GetFullPathNameW
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
HeapSize
WriteConsoleW
CreateThread
FormatMessageW
TlsAlloc
InitializeCriticalSectionAndSpinCount
RtlPcToFileHeader
RtlUnwindEx
RaiseException
OutputDebugStringW
GetCurrentProcess
GetModuleFileNameW
GetFileAttributesW
CreateToolhelp32Snapshot
Sleep
GetLastError
Process32NextW
Process32FirstW
CloseHandle
GetNativeSystemInfo
GetProcAddress
CreateProcessW
GetModuleHandleW
IsWow64Process
GetEnvironmentVariableW
GetTickCount64
GetComputerNameW
IsDebuggerPresent
CreateDirectoryW
SetConsoleOutputCP
SizeofResource
FindNextFileW
InitializeCriticalSectionEx
FindClose
WaitForSingleObject
LockResource
DeleteFileW
LoadResource
FindResourceW
DecodePointer
DeleteCriticalSection
GetExitCodeProcess
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
SetLastError
RtlUnwind
QueryPerformanceCounter
GetTickCount
EnterCriticalSection
LeaveCriticalSection
SetEvent
CreateEventA
MultiByteToWideChar
QueryPerformanceFrequency
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
LoadLibraryA
WideCharToMultiByte
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
GetCurrentProcessId
SleepEx
VerSetConditionMask
VerifyVersionInfoW
CreateFileA
GetFileSizeEx
GetStringTypeW
GetSystemTimeAsFileTime
EncodePointer
LCMapStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
GetCurrentThreadId
InitializeSListHead
shell32
ShellExecuteW
bcrypt
BCryptGenRandom
Sections
.text Size: 686KB - Virtual size: 685KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 179KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8.2MB - Virtual size: 8.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ