C:\assemblage_aaai_code\Builds\8639059380394232174sodpadbokb\NTFS-Search\assemblage_outdir_bin\NTFS-Search.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5766351eded4f9d031426b8b865adb0f8cbe8bcd1130d6d7533efc23b18d6179.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5766351eded4f9d031426b8b865adb0f8cbe8bcd1130d6d7533efc23b18d6179.exe
Resource
win10v2004-20240802-en
General
-
Target
5766351eded4f9d031426b8b865adb0f8cbe8bcd1130d6d7533efc23b18d6179
-
Size
223KB
-
MD5
4a4a3e48cfd6115667965825c88dbc50
-
SHA1
f13999c75c37962f031cb25fb0da695703ce6f50
-
SHA256
5766351eded4f9d031426b8b865adb0f8cbe8bcd1130d6d7533efc23b18d6179
-
SHA512
b5ade2200dfa7e6037ee3cacdb68717af3e2e9d7eddec9817ecd62ced0e349dc48ab9befa9a9cb5ad7b2acfef4c4c13466db0f31b50b69bbae324ee05363ad89
-
SSDEEP
3072:xRMHNf3XJQIw0wY4I0Dhpz0povsS3OxwQxzH6eu3nTN2euE:XwNfpjPwdDDhpYwQqnT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5766351eded4f9d031426b8b865adb0f8cbe8bcd1130d6d7533efc23b18d6179
Files
-
5766351eded4f9d031426b8b865adb0f8cbe8bcd1130d6d7533efc23b18d6179.exe windows:6 windows x64 arch:x64
129d849202b2a9dcde88f73873d52def
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
comctl32
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
InitCommonControlsEx
shell32
ShellExecuteW
ShellExecuteExW
shlwapi
PathCombineW
kernel32
UnhandledExceptionFilter
WriteConsoleW
FlushFileBuffers
DebugBreak
LoadLibraryW
FreeLibrary
GetLogicalDrives
GetDriveTypeW
SetLastError
Beep
Sleep
CloseHandle
CreateFileW
GetFileInformationByHandleEx
WriteFile
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
DeleteFileW
MoveFileExW
GetProcAddress
GetLastError
FormatMessageW
LocalFree
ReadFile
SetFilePointer
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
LCMapStringW
GetFileType
HeapFree
HeapAlloc
GetACP
GetStdHandle
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
LoadLibraryExW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
OpenClipboard
PostMessageW
GetParent
SetWindowTextW
SetFocus
GetDlgItemTextW
GetFocus
MessageBoxW
EnableWindow
TrackPopupMenu
InvalidateRect
CharLowerW
SetWindowLongPtrW
MapWindowPoints
GetWindowRect
MoveWindow
wsprintfW
SendMessageW
GetDlgItem
DrawTextW
SendDlgItemMessageW
EmptyClipboard
PostQuitMessage
DestroyMenu
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
DialogBoxParamW
SetMenuDefaultItem
GetSubMenu
LoadMenuW
DestroyIcon
GetSystemMetrics
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
LoadStringW
CloseClipboard
SetClipboardData
EndDialog
comdlg32
GetSaveFileNameW
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ