E:\免杀\zero\code\Release\code.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1412ffb69ff4d48945a75c7e48321e19ec83403659547b4333708f75b56f8e52.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1412ffb69ff4d48945a75c7e48321e19ec83403659547b4333708f75b56f8e52.exe
Resource
win10v2004-20240802-en
General
-
Target
1412ffb69ff4d48945a75c7e48321e19ec83403659547b4333708f75b56f8e52
-
Size
648KB
-
MD5
54655d848f2d6206cdafe9f127651204
-
SHA1
26772df530d6022a02ac94502416c25cf3157517
-
SHA256
1412ffb69ff4d48945a75c7e48321e19ec83403659547b4333708f75b56f8e52
-
SHA512
30f7a64aebcc602da0457d0d79e124ac0b83147967c66e796c8f9e2fd5af3889a98879f6c5d33cf688aa921b5b7c62411cc6c1079ac1045d46e95cec01aa8ccc
-
SSDEEP
12288:/ArYXO5pCbveyr5+XFYkT4yEHbds3k/D+gbwxW7oddq7rCs+48g:/ArTWbve0+VYk05hKkqgKW7B/WZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1412ffb69ff4d48945a75c7e48321e19ec83403659547b4333708f75b56f8e52
Files
-
1412ffb69ff4d48945a75c7e48321e19ec83403659547b4333708f75b56f8e52.exe windows:5 windows x86 arch:x86
b95a64a6076f6be9654f93b3e429e422
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
Sleep
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
GetStdHandle
GetConsoleCP
FindClose
CreateFileW
IsValidCodePage
GetConsoleMode
LoadLibraryA
CloseHandle
GetCurrentProcessId
SystemTimeToFileTime
FreeLibrary
GetFileType
GetSystemTime
AreFileApisANSI
ReadFile
TryEnterCriticalSection
HeapCreate
HeapFree
EnterCriticalSection
GetFullPathNameW
WriteFile
InterlockedCompareExchange
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
WaitForSingleObject
GetFileAttributesW
GetCurrentThreadId
GetVersionExW
UnmapViewOfFile
HeapValidate
HeapSize
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetLastError
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
WaitForSingleObjectEx
GetVersionExA
DeleteFileA
DeleteFileW
HeapReAlloc
GetSystemInfo
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
CreateFileMappingA
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
GetProcessHeap
GetSystemTimeAsFileTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetStringTypeW
SetStdHandle
SetFilePointerEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
QueryPerformanceFrequency
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleFileNameA
GetACP
CompareStringW
LCMapStringW
DecodePointer
user32
MessageBoxA
EnumChildWindows
Sections
.text Size: 519KB - Virtual size: 518KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ