C:\Users\conspiracy\source\repos\VxnMMAP\x64\Release\VxnMMAP.pdb
Static task
static1
General
-
Target
VixenFreeTemp.exe
-
Size
5.4MB
-
MD5
62fb2e68e1e9b15ca086062689beb0c5
-
SHA1
d98df38f238670ca8810b1eb4659bc3d7b7f85f5
-
SHA256
0b76053593f9f673bf77973b0561ad36c8a095ab9c9e7ebbeebbe6e0987a7bf2
-
SHA512
9f5c581731d9606fc8a5d7c423a043d41da829b2c12fd8b2d98e77c3176af4ce412fc227fdc5e49d85ea3ae394df17a1dbf6fef59d7121c75a06243ca369f613
-
SSDEEP
98304:5Ta4QTmRSmRW5S/qUH76NzvqQaxuziFQKVTC3D1ZHVVl5wsw3:xa0pQCqUlQx0QGW3DNnrw3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource VixenFreeTemp.exe
Files
-
VixenFreeTemp.exe.exe windows:6 windows x64 arch:x64
7ca3986f2489bf83ff24cacf54a297e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
Sleep
CloseHandle
Process32NextW
CreateThread
GetConsoleWindow
GetFileAttributesExW
FindFirstFileW
FindClose
CreateFileW
GetLocaleInfoEx
FormatMessageA
LocalFree
SetFileInformationByHandle
AreFileApisANSI
GetLastError
GetModuleHandleW
GetFileInformationByHandleEx
MultiByteToWideChar
WideCharToMultiByte
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
SleepConditionVariableSRW
GetCurrentThreadId
WakeAllConditionVariable
QueryPerformanceCounter
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentProcessId
user32
EnumWindows
GetWindowLongPtrW
SetWindowLongPtrW
FindWindowA
msvcp140
_Query_perf_frequency
?_Winerror_map@std@@YAHH@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Syserror_map@std@@YAPEBDH@Z
_Query_perf_counter
dwmapi
DwmSetWindowAttribute
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memchr
_CxxThrowException
__current_exception
__std_exception_copy
__std_exception_destroy
memmove
memcmp
memcpy
__C_specific_handler
__current_exception_context
memset
api-ms-win-crt-heap-l1-1-0
_callnewh
malloc
free
_set_new_mode
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___argv
_initialize_onexit_table
_exit
_initterm_e
_initterm
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_register_onexit_function
_set_app_type
_seh_filter_exe
_crt_atexit
abort
_invalid_parameter_noinfo_noreturn
system
terminate
exit
__p___argc
api-ms-win-crt-stdio-l1-1-0
__p__commode
__stdio_common_vfprintf
_set_fmode
__acrt_iob_func
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
___lc_codepage_func
api-ms-win-crt-math-l1-1-0
__setusermatherr
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.3MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ