c:\Users\michi\Desktop\Rootkit\Rootkit.C\release\Rootkit.C.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5e1a9f243001d953f50801d8737ee7a110bac64ad660e8b9ccb770dec5af1084N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5e1a9f243001d953f50801d8737ee7a110bac64ad660e8b9ccb770dec5af1084N.exe
Resource
win10v2004-20240802-en
General
-
Target
5e1a9f243001d953f50801d8737ee7a110bac64ad660e8b9ccb770dec5af1084N
-
Size
104KB
-
MD5
1d4ee101ebee138d658b673e9e57d500
-
SHA1
a7640258caa9fe5b911ac8568a70aa3a75375a4b
-
SHA256
5e1a9f243001d953f50801d8737ee7a110bac64ad660e8b9ccb770dec5af1084
-
SHA512
38e34bbb2cbcb077b29b78d493a3c3c9dc38a72658a04761a3971190b612ca1d7ed6110d39c0409f003f607390041aef1fcc13229abcf854d4c486e20ba51523
-
SSDEEP
1536:ngTJCNMiJ0dxUEy5beFI5sxyCNYwUch0IdTh8evcmmt0D/:n2JhCgPCR41hWevcmmt0D/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e1a9f243001d953f50801d8737ee7a110bac64ad660e8b9ccb770dec5af1084N
Files
-
5e1a9f243001d953f50801d8737ee7a110bac64ad660e8b9ccb770dec5af1084N.exe windows:4 windows x86 arch:x86
135ac2edf354e1799533690f7a349455
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
closesocket
listen
accept
htonl
htons
shutdown
recv
bind
socket
WSAStartup
send
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
CreateFileA
GetCurrentProcess
GetModuleFileNameA
OpenProcess
Process32First
LoadLibraryExA
WaitForSingleObject
CreateMutexA
Sleep
CreateToolhelp32Snapshot
GetProcAddress
CloseHandle
CopyFileA
VirtualAllocEx
GetTempPathA
GetTickCount
WriteProcessMemory
LoadLibraryA
DeleteFileA
CreateRemoteThread
Process32Next
TerminateProcess
GetWindowsDirectoryA
SetErrorMode
FreeLibrary
GetSystemDirectoryA
GetLocaleInfoA
CompareStringA
CompareStringW
SetEnvironmentVariableA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
GetLastError
GetModuleHandleA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ReadFile
MultiByteToWideChar
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
HeapFree
CreateProcessA
DuplicateHandle
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
ResumeThread
HeapReAlloc
GetSystemTimeAsFileTime
ExitProcess
MoveFileA
GetCommandLineA
GetVersionExA
GetProcessHeap
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetFileAttributesA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
CreatePipe
GetExitCodeProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
WriteFile
HeapSize
InitializeCriticalSection
RaiseException
SetStdHandle
SetFilePointer
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
shlwapi
PathFindFileNameA
advapi32
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
user32
ShowWindow
GetWindowThreadProcessId
PostMessageA
EnumWindows
GetForegroundWindow
FindWindowA
MessageBoxA
shell32
ShellExecuteA
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ