E:\Desktop\AV\inceptor\inceptor\temp\beacon-temp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3b34d7304cd4b5fab9df0ff038d2474b2bf08bc0d72dbeaf92f23bd4047eca50.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3b34d7304cd4b5fab9df0ff038d2474b2bf08bc0d72dbeaf92f23bd4047eca50.exe
Resource
win10v2004-20240802-en
General
-
Target
785ba5e5ed75864cf20b8a2e9ae0a710.zip
-
Size
331KB
-
MD5
f20326ad12a3914a44d00d7244415009
-
SHA1
549777a739d5ea0c075533f82d275af833e2f53f
-
SHA256
11798f0b1834bc5ea26daeff21af545a01aaec66dc933105edac9303dbdb94b4
-
SHA512
6071817860a9d57d827971fe14c3cb1018fa85e56f99287db40aacb14aa20220dd0ce50a72e3a00ca7d509d841069821046b6d55440414c6c0e7559408b885e5
-
SSDEEP
6144:vdG4GXVInmbfL9NwsuQT9CV9Y/S9APIstgzRSM0vQZpjuQmig0S83GkzPrGnNElV:FG4bmtNzbT9CgK9OIs2RSJv0iH0S8jPx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3b34d7304cd4b5fab9df0ff038d2474b2bf08bc0d72dbeaf92f23bd4047eca50
Files
-
785ba5e5ed75864cf20b8a2e9ae0a710.zip.zip
Password: infected
-
3b34d7304cd4b5fab9df0ff038d2474b2bf08bc0d72dbeaf92f23bd4047eca50.exe windows:6 windows x64 arch:x64
Password: infected
479ec8f1c68798d02cf4889ff7a0e6c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
VirtualAlloc
Sleep
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
vcruntime140
memcpy
__C_specific_handler
__std_type_info_destroy_list
__current_exception
__current_exception_context
memset
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
puts
__acrt_iob_func
_set_fmode
__p__commode
api-ms-win-crt-heap-l1-1-0
malloc
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
_set_app_type
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_seh_filter_exe
terminate
_crt_at_quick_exit
_seh_filter_dll
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 315KB - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 337B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 471B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ