C:\assemblage\Builds\7765313956178385250iwvgjsvsht\The-sword-refers-to-offer-master\33_SquenceOfBST\assemblage_outdir_bin\33_SquenceOfBST.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14996c7e29f6b370fe71b30be16b5912ed6089cd98d18689c431f61f1f9e6f04.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
14996c7e29f6b370fe71b30be16b5912ed6089cd98d18689c431f61f1f9e6f04.exe
Resource
win10v2004-20240802-en
General
-
Target
14996c7e29f6b370fe71b30be16b5912ed6089cd98d18689c431f61f1f9e6f04
-
Size
46KB
-
MD5
8b4f56c0b7ad295bfd292d6bf641302c
-
SHA1
d8c754fcfdd776e1c44fd36907129a0a4d86353c
-
SHA256
14996c7e29f6b370fe71b30be16b5912ed6089cd98d18689c431f61f1f9e6f04
-
SHA512
a51c87957d9c3b907be3dc7401bdba25fa3ae8179efa3278989ea8e1bf4d3ce22ad88c83f469592d3d937d58b2feb488d54ffe41f88a9db4d58d6ebc6ebce606
-
SSDEEP
384:MtiksdMIZjxhmopeTGDiA/26+Zenq8YhvKRW6jzcvQ:iikshZ3rnDiA/fq8UiRW6j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14996c7e29f6b370fe71b30be16b5912ed6089cd98d18689c431f61f1f9e6f04
Files
-
14996c7e29f6b370fe71b30be16b5912ed6089cd98d18689c431f61f1f9e6f04.exe windows:6 windows x64 arch:x64
8b31c85312eb6220b2308acc1602f904
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
vcruntime140d
__std_type_info_destroy_list
__C_specific_handler
ucrtbased
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
_c_exit
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
terminate
_cexit
__p___argv
__p___argc
_set_fmode
_exit
exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
__setusermatherr
_set_app_type
_seh_filter_exe
__stdio_common_vfprintf
__acrt_iob_func
_seh_filter_dll
kernel32
RtlLookupFunctionEntry
RtlVirtualUnwind
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlCaptureContext
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 299B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ