C:\Users\Administrator\source\repos\KillWindows\x64\Release\KillWindows.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9998034b4a25a37c86651d85306be7b1fe949be3df3ccbb0ede943bbef414f8a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9998034b4a25a37c86651d85306be7b1fe949be3df3ccbb0ede943bbef414f8a.exe
Resource
win10v2004-20240802-en
General
-
Target
9998034b4a25a37c86651d85306be7b1fe949be3df3ccbb0ede943bbef414f8a
-
Size
301KB
-
MD5
27ed2ca1b852640d6cd2646672a90f74
-
SHA1
5869b882e35194e3f8536e1893055ba5eb2725b2
-
SHA256
9998034b4a25a37c86651d85306be7b1fe949be3df3ccbb0ede943bbef414f8a
-
SHA512
9205238bd48e051d57fe66aba8dfc2367ec6c6c1e1c932e2af7353331820741c6d008547bb427bca19d19c3565765d0370af085523071f25ebf68e61f3088f2e
-
SSDEEP
6144:lCburfqKlylZXGSIqpMVsKnY4aF/5T9X:lC6hl3SIqpK5IB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9998034b4a25a37c86651d85306be7b1fe949be3df3ccbb0ede943bbef414f8a
Files
-
9998034b4a25a37c86651d85306be7b1fe949be3df3ccbb0ede943bbef414f8a.exe windows:6 windows x64 arch:x64
6dd8660bcd5bf4ed5764dc447ffe309a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntdll
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlUnwindEx
RtlPcToFileHeader
NtOpenFile
RtlInitUnicodeString
NtWriteFile
RtlCaptureContext
RtlUnwind
kernel32
GetProcAddress
GetModuleHandleW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadFile
CreatePipe
GetFileAttributesExW
GetExitCodeProcess
WaitForSingleObject
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
VirtualProtect
CloseHandle
Process32FirstW
Process32NextW
GetLastError
Sleep
MultiByteToWideChar
CreateToolhelp32Snapshot
CreateFileW
OpenProcess
GetModuleFileNameW
WriteFile
lstrlenW
GetCurrentProcess
FreeEnvironmentStringsW
SetEnvironmentVariableW
ReadConsoleW
FlsFree
WriteConsoleW
HeapSize
SetStdHandle
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapAlloc
GetFileType
SetFilePointerEx
GetFileSizeEx
GetCommandLineW
GetStringTypeW
WideCharToMultiByte
GetCurrentThreadId
LCMapStringEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
GetCommandLineA
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
WakeAllConditionVariable
QueryPerformanceCounter
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
DuplicateHandle
CreateProcessW
ExitProcess
GetStdHandle
GetProcessHeap
user32
GetDesktopWindow
DrawIconEx
DrawTextW
ReleaseDC
FindWindowW
LoadIconW
DestroyIcon
GetClientRect
GetDC
FillRect
GetSystemMetrics
ShowWindow
gdi32
SelectObject
EnumFontFamiliesExW
CreateFontW
SetTextColor
SetBkMode
LineTo
CreatePen
MoveToEx
DeleteObject
CreateSolidBrush
advapi32
RegCloseKey
GetUserNameA
RegSetValueExW
RegOpenKeyExW
shell32
SHGetFolderPathW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
Sections
.text Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fptable Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ