shellcode_executor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b17852271e6713aa798349385722aa8d297c9fbcfc6b1ee5cab08c17808e4773.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b17852271e6713aa798349385722aa8d297c9fbcfc6b1ee5cab08c17808e4773.exe
Resource
win10v2004-20240910-en
General
-
Target
b17852271e6713aa798349385722aa8d297c9fbcfc6b1ee5cab08c17808e4773
-
Size
205KB
-
MD5
0ef6dd35893bcf09f79bde99945e433d
-
SHA1
b9a36c4c136f6b184233c2877265c3822b8929ef
-
SHA256
b17852271e6713aa798349385722aa8d297c9fbcfc6b1ee5cab08c17808e4773
-
SHA512
4c38c3150638322c0ff8b593378728c32e465543993003b7a3f93c0eb14100ab9251de2157f35f7a80b5ddfeb67e5c7ac19b3688c2f913c0dd56c02e1000d117
-
SSDEEP
3072:diWl9Wspep60ffglW3AIJPeV469ZEn3fazaGiNPRJQ6ybSMhkkBdGNIke313wP8:dZl9WspetYUAIm46Y3lGgofb/UI1w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b17852271e6713aa798349385722aa8d297c9fbcfc6b1ee5cab08c17808e4773
Files
-
b17852271e6713aa798349385722aa8d297c9fbcfc6b1ee5cab08c17808e4773.exe windows:6 windows x64 arch:x64
73aab25842eec472ca1f5bcec33593ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-synch-l1-2-0
WaitOnAddress
WakeByAddressAll
WakeByAddressSingle
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
kernel32
UnhandledExceptionFilter
InitializeSListHead
GetCurrentThreadId
CreateMutexA
IsDebuggerPresent
SetUnhandledExceptionFilter
VirtualAlloc
GetLastError
CreateThread
WaitForSingleObject
GetSystemInfo
GetSystemTimeAsFileTime
QueryPerformanceCounter
CloseHandle
AddVectoredExceptionHandler
SetThreadStackGuarantee
CreateWaitableTimerExW
SetWaitableTimer
Sleep
RtlCaptureContext
RtlVirtualUnwind
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
GetCurrentProcess
GetStdHandle
GetCurrentProcessId
HeapFree
HeapReAlloc
lstrlenW
ReleaseMutex
GetProcessHeap
HeapAlloc
GetConsoleMode
GetModuleHandleW
IsProcessorFeaturePresent
MultiByteToWideChar
WriteConsoleW
GetCurrentThread
GetModuleHandleA
GetProcAddress
WaitForSingleObjectEx
LoadLibraryA
ntdll
NtWriteFile
RtlNtStatusToDosError
vcruntime140
memcmp
memmove
__current_exception
_CxxThrowException
__C_specific_handler
__current_exception_context
memset
__CxxFrameHandler3
memcpy
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-runtime-l1-1-0
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
_configure_narrow_argv
_exit
_set_app_type
__p___argc
__p___argv
_cexit
_seh_filter_exe
_register_thread_local_exe_atexit_callback
_c_exit
exit
terminate
_initialize_onexit_table
_register_onexit_function
_crt_atexit
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ