C:\code\auto_accept\autoaccept.stable.08aFix\target\release\deps\autoaccept.pdb
Static task
static1
Behavioral task
behavioral1
Sample
autoaccept.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
autoaccept.exe
Resource
win10v2004-20240802-en
General
-
Target
autoaccept.exe
-
Size
219KB
-
MD5
75b1b79d957539612574729634488472
-
SHA1
348e575e7ea13ff6e6ca66f79f72e13c9bea50b3
-
SHA256
70f57eae78cd1365a58996daf41ca02de441e30f859b74ca23c3f3d997752e80
-
SHA512
24d8ac50b9221f42cb5f2823855521912bc5ba2416d8620425a0b9fe35951cb40a600b75054ccc03e768d598f03d178014db7d880f969999fa41136e950f3925
-
SSDEEP
3072:ySUFr/2NOycxzinAxA0jelMzfqfZU4r6oK9rk:ySI2N4inAtK1fBm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource autoaccept.exe
Files
-
autoaccept.exe.exe windows:6 windows x64 arch:x64
4246b32b87f4bf7ac25f4ed00cf9ae90
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetCurrentProcess
GetEnvironmentVariableW
GetCurrentDirectoryW
GetStdHandle
GetCurrentProcessId
SetLastError
RtlLookupFunctionEntry
TryAcquireSRWLockExclusive
HeapFree
RtlVirtualUnwind
HeapReAlloc
AcquireSRWLockShared
ReleaseSRWLockShared
RtlCaptureContext
GetProcAddress
GetProcessHeap
HeapAlloc
QueryPerformanceCounter
Sleep
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerExW
GetModuleHandleW
FormatMessageW
MultiByteToWideChar
WriteConsoleW
CreateThread
GetCurrentThread
GetSystemTimeAsFileTime
SetThreadStackGuarantee
AddVectoredExceptionHandler
GetLastError
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
SetConsoleMode
GetConsoleMode
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
CloseHandle
AcquireSRWLockExclusive
ReleaseMutex
ReleaseSRWLockExclusive
IsProcessorFeaturePresent
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
dxgi
CreateDXGIFactory1
d3d11
D3D11CreateDevice
user32
SendInput
GetSystemMetrics
ntdll
RtlNtStatusToDosError
NtWriteFile
vcruntime140
__current_exception_context
__current_exception
__C_specific_handler
_CxxThrowException
memmove
memset
memcmp
__CxxFrameHandler3
memcpy
api-ms-win-crt-runtime-l1-1-0
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_configure_narrow_argv
__p___argc
__p___argv
_cexit
_c_exit
_crt_atexit
_register_thread_local_exe_atexit_callback
terminate
_set_app_type
_seh_filter_exe
_initialize_onexit_table
_register_onexit_function
_exit
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ