C:\assemblage_aaai_code\Builds\1231735641410813430mytuntkzaa\assemblage_outdir_bin\RunHiddenConsole.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a9f519c638a37e4e4f077d1f5e0833d3a937cb69bd2878021d31306c145d9c3d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a9f519c638a37e4e4f077d1f5e0833d3a937cb69bd2878021d31306c145d9c3d.exe
Resource
win10v2004-20240802-en
General
-
Target
a9f519c638a37e4e4f077d1f5e0833d3a937cb69bd2878021d31306c145d9c3d
-
Size
158KB
-
MD5
1da339a62002ff5740c2ef8d63e9ed95
-
SHA1
38fe391955ff59130038bb938b818cc303c370fa
-
SHA256
a9f519c638a37e4e4f077d1f5e0833d3a937cb69bd2878021d31306c145d9c3d
-
SHA512
0dffcfc0f78507f7e2a5b1b17ab42feae50b71f1c912a05ba7ff02d7b4ae85c0e262e569be692e0ce122f01249dc4d93605c674b275fe592378553d6e3d493c4
-
SSDEEP
3072:RuIYwH3qEBxlQY+9im6aGZ3+MySXJpYS2sXMj7fJ:CwH3qq3QY+91EZuMhXf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9f519c638a37e4e4f077d1f5e0833d3a937cb69bd2878021d31306c145d9c3d
Files
-
a9f519c638a37e4e4f077d1f5e0833d3a937cb69bd2878021d31306c145d9c3d.exe windows:6 windows x64 arch:x64
45ed8506b582fa5fb356a79f6730691e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
ReadFile
SetInformationJobObject
SetHandleInformation
SetConsoleTextAttribute
GetCommandLineW
GetStdHandle
WriteFile
AssignProcessToJobObject
GetModuleFileNameW
WaitForMultipleObjects
CreateJobObjectW
CreatePipe
PeekNamedPipe
WaitForSingleObject
CreateFileW
OpenEventW
FreeEnvironmentStringsW
GetACP
CreateEventW
GetLastError
SetEvent
CloseHandle
CreateProcessW
GetEnvironmentStringsW
HeapReAlloc
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
RaiseException
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetCommandLineA
HeapAlloc
HeapFree
GetFileType
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
SetEnvironmentVariableW
SetStdHandle
GetStringTypeW
GetProcessHeap
SetFilePointerEx
WriteConsoleW
HeapSize
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ