Static task
static1
Behavioral task
behavioral1
Sample
idfk why im doing dis.exe
Resource
win11-20240802-en
General
-
Target
idfk why im doing dis.exe
-
Size
8.1MB
-
MD5
4a2eb4ed655c6a908325b45f53280031
-
SHA1
33e20b2b59388e4f7a46fced61f0b43dedf044ab
-
SHA256
88f2167c53ebf8a7f682e3e86679021367ae0ba508da0e5665d08af40e6b244f
-
SHA512
ac1abc477d960b4a6cbb0bbd5c09c1af508b922c40ddb1e7ae48707a77d71a4d7bc2713ca64e67a9a8d0ba6e1fe9ea4fea1491e4d12ddcac8d6285eee122fd76
-
SSDEEP
196608:7Pba4XxFsoORZJ8/Hz278doUr4UsodmoC/VZHVyy8JksSR71HP7jRXmr:bG4BKoI4HyAHcUddxC/71yTksSZFjh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource idfk why im doing dis.exe
Files
-
idfk why im doing dis.exe.exe windows:6 windows x64 arch:x64
e48f198b19448103134d8a08105f2311
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VerSetConditionMask
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
user32
SetLayeredWindowAttributes
gdi32
CreateSolidBrush
advapi32
RegCreateKeyW
shell32
SHGetFolderPathW
msvcp140
?widen@?$ctype@_W@std@@QEBA_WD@Z
d3d11
D3D11CreateDeviceAndSwapChain
ntdll
RtlInitUnicodeString
imm32
ImmSetCandidateWindow
d3dcompiler_47
D3DCompile
dwmapi
DwmExtendFrameIntoClientArea
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__current_exception_context
api-ms-win-crt-heap-l1-1-0
malloc
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
api-ms-win-crt-math-l1-1-0
powf
api-ms-win-crt-stdio-l1-1-0
fputc
api-ms-win-crt-filesystem-l1-1-0
_wremove
api-ms-win-crt-convert-l1-1-0
atof
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-string-l1-1-0
tolower
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
Sections
.text Size: - Virtual size: 452KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tY[ Size: - Virtual size: 6.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Bi> Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.v88 Size: 8.1MB - Virtual size: 8.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ