E:\mal\mal_bypass\x64\Release\mal_bypass.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8c0350958b9663ee441174319b183c0369a1e132d87bc7fd2148cf631e2a91f1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c0350958b9663ee441174319b183c0369a1e132d87bc7fd2148cf631e2a91f1.exe
Resource
win10v2004-20240802-en
General
-
Target
8c0350958b9663ee441174319b183c0369a1e132d87bc7fd2148cf631e2a91f1
-
Size
27KB
-
MD5
f40ca2795cccf19727c787cdb241adf2
-
SHA1
61b84ddbf540c4b36c895b491dccb385f5ca4104
-
SHA256
8c0350958b9663ee441174319b183c0369a1e132d87bc7fd2148cf631e2a91f1
-
SHA512
e276fad6a277f0e1e70a6e3b32a3d402a1dcff2f935b65cb922f09eaea7237c71fdb9695332cbd61d344a8484e4d61b77006c66f0a363d6098fe8da36cba6d40
-
SSDEEP
384:1Y+KTEpls76N2XghKM75Llhl0RVTORgL5zTH4tNIGNT3HLIwpXDjYBQNVQSQ73IS:nGXgMsRgL5PYtpN7sKNc73YE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c0350958b9663ee441174319b183c0369a1e132d87bc7fd2148cf631e2a91f1
Files
-
8c0350958b9663ee441174319b183c0369a1e132d87bc7fd2148cf631e2a91f1.exe windows:6 windows x64 arch:x64
f4eed7ef81187ffc8331d0034219076e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
SizeofResource
GetCurrentProcess
TerminateProcess
GetProcessId
LoadLibraryA
LockResource
CloseHandle
GetSystemInfo
LoadResource
FindResourceW
GetProcAddress
GlobalMemoryStatusEx
GetModuleHandleW
VirtualFreeEx
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
RtlCaptureContext
msvcp140
_Query_perf_frequency
?_Xout_of_range@std@@YAXPEBD@Z
?_Xlength_error@std@@YAXPEBD@Z
_Thrd_sleep
_Query_perf_counter
_Xtime_get_ticks
vcruntime140_1
__CxxFrameHandler4
vcruntime140
_CxxThrowException
__C_specific_handler
__current_exception_context
__current_exception
__std_exception_copy
memmove
__std_exception_destroy
memcpy
memset
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
_set_new_mode
api-ms-win-crt-string-l1-1-0
_wcsicmp
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
__stdio_common_vsprintf_s
api-ms-win-crt-convert-l1-1-0
strtol
api-ms-win-crt-runtime-l1-1-0
__p___argv
__p___argc
_register_onexit_function
_c_exit
_initialize_narrow_environment
_exit
exit
_initterm_e
_initterm
_cexit
_crt_atexit
_configure_narrow_argv
_register_thread_local_exe_atexit_callback
_set_app_type
_seh_filter_exe
_get_initial_narrow_environment
_initialize_onexit_table
_invalid_parameter_noinfo_noreturn
terminate
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ