C:\assemblage\Builds\703544157133944114giiendsets\2D_Arrays-master\2D_Arrays_2\assemblage_outdir_bin\2D_Arrays_2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3b752ac4737e065f88658796384170b7d0e4ddf245e52c2c20b124ab9249a203.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b752ac4737e065f88658796384170b7d0e4ddf245e52c2c20b124ab9249a203.exe
Resource
win10v2004-20240802-en
General
-
Target
3b752ac4737e065f88658796384170b7d0e4ddf245e52c2c20b124ab9249a203
-
Size
47KB
-
MD5
c56419a28e8e58d138ec51e57e93bdfe
-
SHA1
074299eeea58ddc3b25ca3f9d07e9e627b9a0c3c
-
SHA256
3b752ac4737e065f88658796384170b7d0e4ddf245e52c2c20b124ab9249a203
-
SHA512
7d4e7dc84426eed41f73829b7ba031c2f94997731ccfcd7d561b3cec4945704c18b9026a986587e9361491c7c8dd0bb940521c80da2a616fe81c6ddeb97325c9
-
SSDEEP
384:kKSqL9usueT2HyZPpiqI1HSHQ6tuLsQdT1jzQv:kKpcyZPWBSHQ6sLv1j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b752ac4737e065f88658796384170b7d0e4ddf245e52c2c20b124ab9249a203
Files
-
3b752ac4737e065f88658796384170b7d0e4ddf245e52c2c20b124ab9249a203.exe windows:6 windows x64 arch:x64
fd64d82e26c0f8977a4ddda91528874f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
vcruntime140d
__std_type_info_destroy_list
__C_specific_handler
ucrtbased
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_exit
__p__commode
_seh_filter_dll
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
terminate
_set_fmode
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
__setusermatherr
_set_app_type
_seh_filter_exe
malloc
free
_getch
__stdio_common_vfscanf
__stdio_common_vfprintf
__acrt_iob_func
_set_new_mode
kernel32
IsProcessorFeaturePresent
RtlCaptureContext
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 512B - Virtual size: 265B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 365B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ