H:\xdebb2010改 - 副本\x64\Debug\xdebb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ddeee2e9a961d4ff12575175c679a4b749e4d33f30cd89ef5d8501652af5667a.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ddeee2e9a961d4ff12575175c679a4b749e4d33f30cd89ef5d8501652af5667a.exe
Resource
win10v2004-20240802-en
General
-
Target
ddeee2e9a961d4ff12575175c679a4b749e4d33f30cd89ef5d8501652af5667a
-
Size
890KB
-
MD5
73cecf8bb89e22975594bbe0e82b6434
-
SHA1
2857da994718d70df5f45ef07764765ec675f06c
-
SHA256
ddeee2e9a961d4ff12575175c679a4b749e4d33f30cd89ef5d8501652af5667a
-
SHA512
0b1ea47b4f3a069ed4d236407992b4b5b3cf244a63d87390743172aa4f4d11e4eecd1414dd3627428ce8ec4d3ac815e5217cc20204762214a4b3e06aa4e630be
-
SSDEEP
12288:dj2X3IO2pAx+DG2AUQeDXk92wDGpcRbOda7MjW53CNTdpa1zUlqpM:dj2oO7t2bGNGpcRbOy53QTdpaDp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ddeee2e9a961d4ff12575175c679a4b749e4d33f30cd89ef5d8501652af5667a
Files
-
ddeee2e9a961d4ff12575175c679a4b749e4d33f30cd89ef5d8501652af5667a.exe windows:5 windows x64 arch:x64
b698314e99494ef3b1cddb60e8c90f5a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
GetConsoleWindow
Sleep
FlushFileBuffers
CloseHandle
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
GetCommandLineA
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
HeapSize
HeapValidate
IsBadReadPtr
GetModuleFileNameW
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
GetCurrentThreadId
FlsAlloc
FlsFree
SetLastError
GetLastError
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoW
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
WriteFile
HeapAlloc
HeapFree
HeapReAlloc
HeapQueryInformation
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
LoadLibraryW
FreeLibrary
GetLocaleInfoW
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
SetStdHandle
CreateFileW
InitializeCriticalSection
user32
UpdateWindow
ShowWindow
Sections
.text Size: 403KB - Virtual size: 403KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 388KB - Virtual size: 397KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ