C:\Users\tha8b\OneDrive\Desktop\new injectors\MW2019 AIO DEV LOADER - Copy\x64\Release\zim.pdb
Static task
static1
General
-
Target
Driver.exe
-
Size
2.1MB
-
MD5
2ca19d0f12d1f16f6d08b34c48593826
-
SHA1
eb8a5beea1177a71a2123d666638233da57146ad
-
SHA256
29bdf43af7fce4a48a4699f01ba35a9d23ec72109f9a8d59b84788610066b715
-
SHA512
d9217fd4f397f1a0a81447332f563ece283db881e693034135524937775b7fbb75f97bde586d12f29b3841c4d9811d1b36d64c266fcf08983e2ea83c63d5adbd
-
SSDEEP
49152:MKJhzckSniODlvlLyE/r9NCbm1M7nvUoJC+O93+x:M2zckSniCRCbm1MVCru
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Driver.exe
Files
-
Driver.exe.exe windows:6 windows x64 arch:x64
Password: rain2024
d34eed44db328d2e496951f9c30d2670
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
ReadFile
WriteFile
Beep
GetLastError
Sleep
GetCurrentProcess
GetWindowsDirectoryW
VirtualAlloc
VirtualFree
FreeLibrary
GetProcAddress
LoadLibraryExA
GetFileSize
LoadLibraryW
CreateToolhelp32Snapshot
Process32First
Process32Next
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
DeleteFileW
DeviceIoControl
CloseHandle
LoadLibraryA
CreateFileW
GetModuleHandleW
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
InitializeSListHead
user32
IsWindowVisible
PostThreadMessageA
GetWindowThreadProcessId
GetWindow
EnumWindows
UnhookWindowsHookEx
SetWindowsHookExA
shell32
ShellExecuteW
msvcp140
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exception@std@@YA_NXZ
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlImageNtHeader
RtlVirtualUnwind
vcruntime140
__current_exception
__C_specific_handler
__std_exception_copy
memcmp
__std_terminate
memset
memmove
memcpy
_CxxThrowException
__std_exception_destroy
__current_exception_context
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_invalid_parameter_noinfo_noreturn
_initialize_narrow_environment
_set_app_type
_configure_narrow_argv
_get_initial_narrow_environment
_initterm
_initterm_e
_exit
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_seh_filter_exe
exit
terminate
api-ms-win-crt-string-l1-1-0
_stricmp
strcpy_s
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
malloc
_callnewh
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-utility-l1-1-0
rand
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 275KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ