C:\Users\Asus\Desktop\Project1\x64\Debug\jsjjjs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
51afbdc4314f4b026e42872c889c36a306a059a5be1d4103e7f4656754bbe62f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
51afbdc4314f4b026e42872c889c36a306a059a5be1d4103e7f4656754bbe62f.exe
Resource
win10v2004-20240802-en
General
-
Target
51afbdc4314f4b026e42872c889c36a306a059a5be1d4103e7f4656754bbe62f
-
Size
857KB
-
MD5
4c94ae8af502316fbef6956f4d3bcb6c
-
SHA1
4905d59e4c601cb86cc45d7f437f9b3905e1bf7a
-
SHA256
51afbdc4314f4b026e42872c889c36a306a059a5be1d4103e7f4656754bbe62f
-
SHA512
9a782290691f323abd210c90ac81bd629003c35ce0766d9ea9ad8cbcccf6aacb9c543b4ea9e6a8d08461368076e6dfea9af952acf4804263304e72a58de67c78
-
SSDEEP
12288:W4Ky6oaR9iupPlBXHdOiXhd70t/cipI2w44SRc6rOe:TKyxaR9iulXHJ7Yc76
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 51afbdc4314f4b026e42872c889c36a306a059a5be1d4103e7f4656754bbe62f
Files
-
51afbdc4314f4b026e42872c889c36a306a059a5be1d4103e7f4656754bbe62f.exe windows:6 windows x64 arch:x64
bbfc7f56e337d03fd11b2ec571d803c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
CreateDirectoryA
GetFileAttributesA
DecodePointer
RaiseException
GetLastError
SetLastError
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
FindResourceExW
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
CreateFileW
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetStringTypeW
SetStdHandle
HeapQueryInformation
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
IsDebuggerPresent
OutputDebugStringW
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
GetCurrentProcess
TerminateProcess
RtlPcToFileHeader
RtlUnwindEx
InterlockedPushEntrySList
InterlockedFlushSList
EncodePointer
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
GetModuleFileNameW
HeapValidate
GetSystemInfo
GetStdHandle
WriteFile
GetACP
GetCurrentThread
GetFileType
OutputDebugStringA
WriteConsoleW
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
MoveFileExW
RtlUnwind
user32
LoadCursorA
EndPaint
BeginPaint
UpdateWindow
TranslateAcceleratorA
LoadAcceleratorsA
EndDialog
DialogBoxParamA
ShowWindow
LoadIconA
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringW
UnregisterClassA
DestroyWindow
Sections
.text Size: 624KB - Virtual size: 623KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ