C:\Users\Goziix\Desktop\Ghosty\build\usermode\usermode.pdb
Static task
static1
Behavioral task
behavioral1
Sample
26406c587a518c9b6ab8fd95252cbb347b853f9f5fd0f2b287f8bcd2d9905e34.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26406c587a518c9b6ab8fd95252cbb347b853f9f5fd0f2b287f8bcd2d9905e34.exe
Resource
win10v2004-20240802-en
General
-
Target
26406c587a518c9b6ab8fd95252cbb347b853f9f5fd0f2b287f8bcd2d9905e34.exe
-
Size
623KB
-
MD5
d0e53e2a0bef6c93e0ccad47a650079d
-
SHA1
8e69fc482c058749cc7974e94ad7d571fca6ccf2
-
SHA256
26406c587a518c9b6ab8fd95252cbb347b853f9f5fd0f2b287f8bcd2d9905e34
-
SHA512
4377d1a2e3c3ef2065b445f004cb9e2853bfc12f35e38315013c02b45e0c6059cb1e5d5200875026de358cc91b51b6f2c13ed9fd92b49a10f7d67267e8216f48
-
SSDEEP
12288:RE+F1v/+mon5DpjiNb58UxCj2AqeMQmHnJpaWH:/7/+v5UNb58uGKFHnJpZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26406c587a518c9b6ab8fd95252cbb347b853f9f5fd0f2b287f8bcd2d9905e34.exe
Files
-
26406c587a518c9b6ab8fd95252cbb347b853f9f5fd0f2b287f8bcd2d9905e34.exe.exe windows:6 windows x64 arch:x64
11c012ef8b8b753a6c7dfac749804464
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
d3d9
Direct3DCreate9Ex
kernel32
VirtualFree
GetCurrentProcess
OutputDebugStringA
DeviceIoControl
VirtualAlloc
Thread32Next
Thread32First
CreateFileW
GetCurrentThreadId
GetModuleHandleA
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
GetLastError
GetCurrentThread
LoadLibraryA
Process32Next
CloseHandle
K32GetModuleBaseNameA
CreateThread
HeapSetInformation
GetThreadContext
GetProcAddress
GetCurrentProcessId
GetProcessHeap
WideCharToMultiByte
lstrcmpiA
K32EnumProcessModules
GetTickCount
OpenThread
IsDebuggerPresent
CheckRemoteDebuggerPresent
SetLastError
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
VirtualProtect
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetModuleHandleW
GetSystemTimeAsFileTime
InitializeSListHead
LocalFree
FormatMessageA
GetLocaleInfoEx
FindClose
FindFirstFileW
GetFileAttributesExW
AreFileApisANSI
GetFileInformationByHandleEx
Process32First
QueryPerformanceCounter
QueryPerformanceFrequency
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
ReleaseSRWLockExclusive
UnhandledExceptionFilter
user32
GetActiveWindow
SetClipboardData
ScreenToClient
LoadCursorA
GetKeyState
SendInput
UpdateWindow
GetClipboardData
EmptyClipboard
RegisterClassExA
FindWindowA
GetDesktopWindow
PeekMessageA
LoadIconA
mouse_event
TranslateMessage
ClientToScreen
CreateWindowExA
DefWindowProcA
SetCursor
GetForegroundWindow
MessageBoxA
SetWindowLongA
CloseClipboard
OpenClipboard
GetCursorPos
SetCursorPos
GetAsyncKeyState
ShowWindow
GetSystemMetrics
SetWindowPos
SetLayeredWindowAttributes
GetClientRect
DestroyWindow
GetWindowRect
GetWindow
DispatchMessageA
advapi32
OpenProcessToken
GetTokenInformation
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmGetContext
msvcp140
_Query_perf_frequency
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_Throw_Cpp_error@std@@YAXH@Z
?uncaught_exceptions@std@@YAHXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?_Winerror_map@std@@YAHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?_Random_device@std@@YAIXZ
?_Xlength_error@std@@YAXPEBD@Z
?_Syserror_map@std@@YAPEBDH@Z
_Query_perf_counter
_Thrd_detach
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@M@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEA_N@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAM@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
??Bid@locale@std@@QEAA_KXZ
ntdll
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
dwmapi
DwmExtendFrameIntoClientArea
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
memchr
strstr
memcmp
memcpy
__std_exception_destroy
__std_exception_copy
memmove
__current_exception
__current_exception_context
__C_specific_handler
_CxxThrowException
memset
api-ms-win-crt-stdio-l1-1-0
__p__commode
_fseeki64
fsetpos
ungetc
_get_stream_buffer_pointers
setvbuf
fgetpos
fclose
__acrt_iob_func
__stdio_common_vsnprintf_s
fflush
fgetc
ftell
fputc
_set_fmode
fseek
__stdio_common_vsprintf_s
__stdio_common_vfprintf
__stdio_common_vsscanf
fread
__stdio_common_vsprintf
_wfopen
fwrite
api-ms-win-crt-string-l1-1-0
strncpy
isprint
strcmp
_stricmp
api-ms-win-crt-utility-l1-1-0
qsort
rand
api-ms-win-crt-heap-l1-1-0
_set_new_mode
_callnewh
free
malloc
api-ms-win-crt-convert-l1-1-0
atof
api-ms-win-crt-runtime-l1-1-0
system
_beginthreadex
terminate
abort
_invalid_parameter_noinfo_noreturn
_register_thread_local_exe_atexit_callback
_c_exit
__p___argv
__p___argc
_exit
_initterm_e
_initterm
_get_initial_narrow_environment
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
exit
api-ms-win-crt-math-l1-1-0
atan2
atan2f
ceilf
cosf
asin
fmodf
pow
tanf
powf
sqrtf
__setusermatherr
floorf
sinf
sqrt
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
_lock_file
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
_configthreadlocale
shell32
ShellExecuteW
Sections
.text Size: 313KB - Virtual size: 313KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ