E:\FilelessPELoader\x64\Release\FilelessPELoader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d70c158c90539a27751a8a5cf5c315400cae9c89e759bb5e1250506bc527e8d9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d70c158c90539a27751a8a5cf5c315400cae9c89e759bb5e1250506bc527e8d9.exe
Resource
win10v2004-20240802-en
General
-
Target
997b60d289d20ef1bf947d7330c7a689.bin
-
Size
9KB
-
MD5
8b2cafe4f8393d2c9aac6dfbe98f5ba7
-
SHA1
0e9f5a0e4e26ca6e4308c82b165d9ff11a2aabb1
-
SHA256
8d9bbae6ce3352c10cddf366bde441b9f1fbd7da10347c35fd85f7abef911d2d
-
SHA512
e619bd59cac8cc61f0565e69843c19a2f0b6a905867c5d7b380e6eb7be698c0a941110e3b41f9d330cf199203a91e51881bc1cc599645fc66fc7755117a26a50
-
SSDEEP
192:qjdWdF5qx6fW7F/cHoH4UxNf1Z/JBcEMQXrSOS7/cWRVLXZIsrpEPEjcBW:gAF3e7g69dJBBMQbXSTvLpavBW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d70c158c90539a27751a8a5cf5c315400cae9c89e759bb5e1250506bc527e8d9.exe
Files
-
997b60d289d20ef1bf947d7330c7a689.bin.zip
Password: infected
-
d70c158c90539a27751a8a5cf5c315400cae9c89e759bb5e1250506bc527e8d9.exe.exe windows:6 windows x64 arch:x64
Password: infected
7b57069f99d986d6c9ef48b4abe307ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
LoadLibraryA
GetProcAddress
GetLastError
WideCharToMultiByte
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
MultiByteToWideChar
ExitThread
LocalAlloc
TerminateProcess
VirtualAlloc
GetCurrentProcess
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
RtlCaptureContext
user32
EnumThreadWindows
advapi32
CryptAcquireContextW
CryptDecrypt
CryptCreateHash
CryptDeriveKey
CryptHashData
CryptDestroyHash
CryptReleaseContext
CryptDestroyKey
shell32
CommandLineToArgvW
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
winhttp
WinHttpQueryDataAvailable
WinHttpSendRequest
WinHttpOpen
WinHttpReadData
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpReceiveResponse
WinHttpConnect
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_copy
__current_exception
__current_exception_context
memset
__std_exception_destroy
__C_specific_handler
_CxxThrowException
memmove
memcpy
api-ms-win-crt-runtime-l1-1-0
_initialize_onexit_table
__p___argv
_initterm_e
_cexit
terminate
_configure_narrow_argv
_c_exit
__p___argc
_set_app_type
_seh_filter_exe
_crt_atexit
_register_thread_local_exe_atexit_callback
_initialize_narrow_environment
_register_onexit_function
exit
_exit
_invalid_parameter_noinfo_noreturn
_initterm
_get_initial_narrow_environment
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
calloc
free
_set_new_mode
api-ms-win-crt-convert-l1-1-0
atoi
mbstowcs
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vfprintf
__p__commode
__acrt_iob_func
api-ms-win-crt-string-l1-1-0
_stricmp
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 708B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ