C:\Users\evan\Documents\AEplugins\glitchify\Glitchify\win\Debug\Glitchify.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Glitchify_1.0.0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Glitchify_1.0.0.dll
Resource
win10v2004-20240802-en
General
-
Target
Glitchify_1.0.0.aex
-
Size
879KB
-
MD5
241b8167a7527c19eca5d2d4e68d801e
-
SHA1
d323bc72ff3f8a61be0002361de39ac7c4fb6fb4
-
SHA256
0fb4fe9147e2c58f28e590de46e1666d97314a16dd393ed21bc57d732e11acb0
-
SHA512
2b73cf9ac23de4e51f64a42f8a5fe5623560457e6df125a014612e37acfa6bc2e4d50bb875aa960db4e517eb6084c1bcabb126a80acfe8fd0b813654f3d77bd6
-
SSDEEP
12288:GW8ifYmZQu8o1nYmhhhmH7lmMYACgdspkpZog4C2:fAmZQEYmhXmHJmuCgCKa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Glitchify_1.0.0.aex
Files
-
Glitchify_1.0.0.aex.dll windows:6 windows x64 arch:x64
Password: infected
39de0fd397dab3644f53cadc0452f276
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SetThreadPriority
CloseHandle
WaitForSingleObject
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateEventA
CreateSemaphoreA
SetEvent
ReleaseSemaphore
RtlLookupFunctionEntry
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
DecodePointer
GetLastError
HeapFree
GetCommandLineA
GetCurrentThreadId
HeapAlloc
CreateThread
ExitThread
GetProcAddress
LoadLibraryExW
SetLastError
GetCurrentThread
IsDebuggerPresent
IsProcessorFeaturePresent
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetProcessHeap
GetStdHandle
GetFileType
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
WriteFile
GetModuleFileNameW
FatalAppExitA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FreeLibrary
HeapReAlloc
OutputDebugStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CreateFileW
Exports
Exports
EntryPointFunc
Sections
.text Size: 626KB - Virtual size: 626KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ