c:\users\bph\documents\visual studio 2013\Projects\part8\Debug\part8.pdb
Static task
static1
Behavioral task
behavioral1
Sample
677097d7480ae4e437041a3761e60680N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
677097d7480ae4e437041a3761e60680N.exe
Resource
win10v2004-20240802-en
General
-
Target
677097d7480ae4e437041a3761e60680N.exe
-
Size
34KB
-
MD5
677097d7480ae4e437041a3761e60680
-
SHA1
945846f049ab334745a6dc4d3fac79ad9949622b
-
SHA256
256a4bb135a842bba1a3c03f93f1e753f4f57a68b311d1c1c5be9d18587e6579
-
SHA512
c6cbdc0bbdf4dd0e126ec4dc29ce9cbe6728ff6863d76c2d772b1462ab10c01d6e17ea8f120932072b529932edabd589af1f1a5a4056cbde4ae0e53e4adbc380
-
SSDEEP
384:mQPb4juENSM4S/Wkersb9m+fKhs1PqzsYpEnb+XgjOj:lL1SeL2U+fys1PfYpOW0g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 677097d7480ae4e437041a3761e60680N.exe
Files
-
677097d7480ae4e437041a3761e60680N.exe.exe windows:6 windows x86 arch:x86
434d04e052b0a76ee866bae4d90b21a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcr120d
_commode
_crt_debugger_hook
__crtUnhandledException
__crtTerminateProcess
?terminate@@YAXXZ
__crtSetUnhandledExceptionFilter
_lock
_fmode
_calloc_dbg
__dllonexit
_onexit
_invoke_watson
_controlfp_s
_except_handler4_common
wcscpy_s
_wmakepath_s
_wsplitpath_s
__initenv
_initterm
_initterm_e
__setusermatherr
_configthreadlocale
_cexit
_exit
exit
_CrtSetCheckCount
_CrtDbgReportW
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
_CRT_RTC_INITW
memset
strcpy
scanf
puts
printf
_unlock
gets
kernel32
GetModuleFileNameW
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
DecodePointer
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryExW
GetProcAddress
GetLastError
RaiseException
IsDebuggerPresent
EncodePointer
GetModuleHandleW
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ