c:\TempDir\TestForPack200\Release\TestForPack200.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b77198753317577694f658c7eada20a0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b77198753317577694f658c7eada20a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b77198753317577694f658c7eada20a0N.exe
-
Size
22KB
-
MD5
b77198753317577694f658c7eada20a0
-
SHA1
2d6ab82a9f1bd2e844d858ea06af852f6366e5a1
-
SHA256
30d641b9c73d3a58903fc315dad9cf80b3b6841006feed7d5ba84de2798267d4
-
SHA512
728a5483975d59b2c0363b7df9b73f2b8abb36ef9b45b0cdf0799546ac125fbae8daaa5192a5a7fac4d27ff8034bd40158795ab41475c549efabf40813048b05
-
SSDEEP
384:Qbxjt55aKAtD4st+JRybHgLVA1gjE0jSvpQlfrq+YzvJmlAZ:QbxRJAtDNt+OshA1gw0ju8O+islA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b77198753317577694f658c7eada20a0N.exe
Files
-
b77198753317577694f658c7eada20a0N.exe.exe windows:4 windows x86 arch:x86
39ae16a09d142c8abdc9930c3ca9f811
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetExitCodeProcess
WaitForSingleObject
ExitProcess
CreateProcessA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
GetProcAddress
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE