testing_file.pdb
Static task
static1
Behavioral task
behavioral1
Sample
testing_file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
testing_file.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
testing_file.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
testing_file.exe
Resource
win11-20240802-en
General
-
Target
testing_file.exe
-
Size
634KB
-
MD5
25e62fe77546e03d7a7168313d2d951b
-
SHA1
0471bae2c54373de98d27a8f4f85f22e5369880f
-
SHA256
fdce2c579f3a0f86dc848d4dbd66439291466f6352a13bcf66d35646dc492670
-
SHA512
75cad3fcf0dcf8933d3ff527ed7bb057668c18d253138f559cf9db47fbfc6fb84f2c3f95d5cfc1d6d6dc68e0a3031e689cb43b629ec08f5412931b184e7b107e
-
SSDEEP
6144:D7teN+DkzrOu9Zhd6MLc9vezHrcEZkYLYO+P7IiU6X2cH+poQZYUA8MYGu+6lJAa:VeH9B6MLcRezrYY1f2KZPfMYCGAC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource testing_file.exe
Files
-
testing_file.exe.exe windows:6 windows x64 arch:x64
3159ccc1862466433c5b143d5f110c77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
bcryptprimitives
ProcessPrng
api-ms-win-core-synch-l1-2-0
WakeByAddressAll
WaitOnAddress
WakeByAddressSingle
kernel32
FormatMessageW
HeapFree
HeapAlloc
WaitForSingleObject
CreateEventW
FreeEnvironmentStringsW
DeleteProcThreadAttributeList
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetCurrentThread
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetFileInformationByHandle
GetCurrentProcess
DuplicateHandle
GetProcAddress
LoadLibraryExA
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
CloseHandle
GetLastError
GetProcessHeap
GetStdHandle
GetCurrentProcessId
CreateMutexA
LoadLibraryA
WriteFileEx
SleepEx
GetExitCodeProcess
WaitForSingleObjectEx
HeapReAlloc
lstrlenW
ReleaseMutex
CreateFileW
GetModuleHandleA
ReadFile
GetOverlappedResult
CancelIo
GetFullPathNameW
CreateThread
GetConsoleMode
ReadConsoleW
WideCharToMultiByte
WriteConsoleW
GetModuleHandleW
GetModuleFileNameW
CreateNamedPipeW
ReadFileEx
WaitForMultipleObjects
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
MultiByteToWideChar
IsProcessorFeaturePresent
oleaut32
VariantClear
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayDestroy
SafeArrayGetLBound
SafeArrayGetUBound
SysStringLen
SysAllocStringLen
SysFreeString
GetErrorInfo
ole32
CoCreateInstance
CoInitializeEx
CoSetProxyBlanket
CoInitializeSecurity
ntdll
NtWriteFile
NtReadFile
RtlNtStatusToDosError
vcruntime140
__C_specific_handler
__current_exception_context
__current_exception
__CxxFrameHandler3
_CxxThrowException
memcpy
memset
memmove
memcmp
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_get_initial_narrow_environment
_seh_filter_exe
terminate
_initialize_narrow_environment
_register_onexit_function
_initialize_onexit_table
_initterm
_crt_atexit
_configure_narrow_argv
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___argv
__p___argc
_initterm_e
_exit
exit
_set_app_type
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 465KB - Virtual size: 465KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ