D:\obs2\build\64\plugins\enc-amf\amf-test\RelWithDebInfo\enc-amf-test64.pdb
Static task
static1
Behavioral task
behavioral1
Sample
877a62b9976d665d6f45f4f56f54a4f0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
877a62b9976d665d6f45f4f56f54a4f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
877a62b9976d665d6f45f4f56f54a4f0N.exe
-
Size
489KB
-
MD5
877a62b9976d665d6f45f4f56f54a4f0
-
SHA1
96e2ea81e90b9b64bb057db1f40868f024ec3800
-
SHA256
59bcb364f65fa2b1141d1b83c8d18d83aa3a2806027b55994346d6f220be17db
-
SHA512
825cd085f4f188df48cdee1b9bae3162da4fbbd1fd2e84a18219b041b1d7ff71fd119b8049b48ec130c0009db90a19377513ec6eff4ee007d9513d9c346a787e
-
SSDEEP
12288:Xpjm0upGIBxUXVNztlEuI6tz7dukLsxD9ywPIE:5jm0u8Lzt6mz7dunywP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 877a62b9976d665d6f45f4f56f54a4f0N.exe
Files
-
877a62b9976d665d6f45f4f56f54a4f0N.exe.exe windows:6 windows x64 arch:x64
63368842a5255dbe6d9a27621728b7f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
version
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
kernel32
InitializeSListHead
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
CloseHandle
DuplicateHandle
SetErrorMode
WaitForSingleObject
GetCurrentProcess
TerminateProcess
CreateThread
GetCurrentThread
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
MultiByteToWideChar
WideCharToMultiByte
VerSetConditionMask
VerifyVersionInfoW
GetCurrentThreadId
DeleteCriticalSection
SetEvent
ResetEvent
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
EnterCriticalSection
RtlVirtualUnwind
SetUnhandledExceptionFilter
IsDebuggerPresent
UnhandledExceptionFilter
user32
GetDesktopWindow
ole32
CoTaskMemFree
CoTaskMemAlloc
msvcp140
?_Throw_C_error@std@@YAXH@Z
_Mtx_destroy_in_situ
?_Xlength_error@std@@YAXPEBD@Z
_Mtx_lock
_Mtx_unlock
_Mtx_init_in_situ
d3d9
Direct3DCreate9Ex
vcruntime140
_purecall
__C_specific_handler
__current_exception_context
__std_exception_destroy
__std_exception_copy
memcmp
__current_exception
memset
__std_terminate
memmove
memcpy
_CxxThrowException
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_get_initial_narrow_environment
_initterm
_initterm_e
_set_app_type
_exit
_seh_filter_exe
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_cexit
terminate
_crt_atexit
_register_onexit_function
_initialize_onexit_table
exit
_initialize_narrow_environment
_configure_narrow_argv
_invalid_parameter_noinfo_noreturn
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
__stdio_common_vswprintf
__acrt_iob_func
__stdio_common_vsscanf
__stdio_common_vsprintf
__stdio_common_vfprintf
fflush
api-ms-win-crt-string-l1-1-0
strncpy
wcsncpy
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-heap-l1-1-0
free
malloc
_set_new_mode
_callnewh
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 400KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ