C:\assemblage_aaai_code\Builds\82982064711289378oyxxafjwwm\MyExec\assemblage_outdir_bin\MyExec.pdb
Static task
static1
Behavioral task
behavioral1
Sample
20f2693136fefec6d6275225e011c92b9cd138734ffcf8d00599f2de5ae20828.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
20f2693136fefec6d6275225e011c92b9cd138734ffcf8d00599f2de5ae20828.exe
Resource
win10v2004-20240802-en
General
-
Target
20f2693136fefec6d6275225e011c92b9cd138734ffcf8d00599f2de5ae20828
-
Size
18KB
-
MD5
3f2a0d89b032c5bf103de81bfa8d3047
-
SHA1
8ea69bf69bbe4656109e5a2260e396665190592a
-
SHA256
20f2693136fefec6d6275225e011c92b9cd138734ffcf8d00599f2de5ae20828
-
SHA512
01462357fcac71d2cedf588fadd0164907a4aadf58c35e757ec3040b539c3716b4bd540d421941a398ce496186c19203a1d32b75c4e6476901fbcdd75a1ef321
-
SSDEEP
384:mv648RwwiklV5NImMz3WIU3rIXfzvta9:lNNMz3S3gfzvtk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20f2693136fefec6d6275225e011c92b9cd138734ffcf8d00599f2de5ae20828
Files
-
20f2693136fefec6d6275225e011c92b9cd138734ffcf8d00599f2de5ae20828.exe windows:6 windows x64 arch:x64
fc8b90f10858c7d2fd2dac080d634ea0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
ReadFile
SetHandleInformation
GetCurrentProcess
InitializeProcThreadAttributeList
CreatePipe
PeekNamedPipe
GetEnvironmentVariableA
WaitForSingleObject
DuplicateHandle
OpenProcess
CreateToolhelp32Snapshot
GetLastError
UpdateProcThreadAttribute
Process32NextW
Process32FirstW
CloseHandle
HeapAlloc
GetProcessHeap
CreateProcessA
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlCaptureContext
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetModuleHandleW
IsDebuggerPresent
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140
__std_exception_destroy
memset
__C_specific_handler
__CxxFrameHandler3
_CxxThrowException
memmove
__std_exception_copy
memcpy
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
__stdio_common_vfprintf
__p__commode
_set_fmode
api-ms-win-crt-string-l1-1-0
_wcsicmp
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_c_exit
terminate
_invalid_parameter_noinfo_noreturn
_cexit
__p___argv
_initterm
_register_thread_local_exe_atexit_callback
__p___argc
_exit
exit
_initterm_e
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_set_app_type
_seh_filter_exe
api-ms-win-crt-heap-l1-1-0
malloc
_callnewh
free
_set_new_mode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ