E:\code\rust\v10\target\debug\deps\bak.pdb
Static task
static1
Behavioral task
behavioral1
Sample
52c4f05a09a576fd37f8ff260e6d0e20a29dadddc54df173c77a948cdc18755d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52c4f05a09a576fd37f8ff260e6d0e20a29dadddc54df173c77a948cdc18755d.exe
Resource
win10v2004-20241007-en
General
-
Target
52c4f05a09a576fd37f8ff260e6d0e20a29dadddc54df173c77a948cdc18755d
-
Size
2.7MB
-
MD5
585e16a826ab65b3b7154157170566ff
-
SHA1
f643bc951b4c597561f273abad35c40bb32f9a95
-
SHA256
52c4f05a09a576fd37f8ff260e6d0e20a29dadddc54df173c77a948cdc18755d
-
SHA512
f81c49adf6328435dafa86875da45fbcbb6ebbcce25bfee5712450f8a135506b5fb1815f51923ea2172ef3e2b625abfed780ee07dc89e59bf201ab888e7b257e
-
SSDEEP
49152:2LyobSoqVmAZtTFIy1uuMMFd5MjKIHfIU6iQssEI:dAaMVw+QssV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52c4f05a09a576fd37f8ff260e6d0e20a29dadddc54df173c77a948cdc18755d
Files
-
52c4f05a09a576fd37f8ff260e6d0e20a29dadddc54df173c77a948cdc18755d.exe windows:6 windows x64 arch:x64
82a3e5cf697c84fa9b87f80e6c9b26f3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
ntdll
RtlUnwindEx
RtlPcToFileHeader
NtAllocateVirtualMemory
NtWriteVirtualMemory
NtProtectVirtualMemory
RtlVirtualUnwind
RtlCaptureContext
RtlLookupFunctionEntry
kernel32
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
HeapSize
GetConsoleOutputCP
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetLastError
GetProcessHeap
HeapAlloc
HeapFree
CloseHandle
AcquireSRWLockExclusive
CreateFileW
GetCurrentProcessId
GetSystemInfo
SleepConditionVariableSRW
EnumSystemGeoID
FreeEnvironmentStringsW
ReleaseMutex
FindClose
ReleaseSRWLockShared
AddVectoredExceptionHandler
SetThreadStackGuarantee
SwitchToThread
GetCurrentProcess
GetCurrentThread
GetProcAddress
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCommandLineW
FlushFileBuffers
SetFilePointerEx
GetStdHandle
SetHandleInformation
WaitForSingleObject
TerminateProcess
WakeAllConditionVariable
WakeConditionVariable
QueryPerformanceCounter
QueryPerformanceFrequency
HeapReAlloc
AcquireSRWLockShared
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetModuleHandleA
FindNextFileW
GetConsoleMode
GetFileType
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
ExitProcess
TlsFree
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
CreateThread
TlsGetValue
TlsSetValue
GetSystemTimeAsFileTime
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
FlsAlloc
GetStringTypeW
RaiseException
GetStartupInfoW
SetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetCommandLineA
GetModuleHandleExW
IsDebuggerPresent
InitializeSListHead
GetCurrentThreadId
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LoadLibraryExW
WriteFile
FreeLibrary
ws2_32
select
connect
WSASocketW
getaddrinfo
ioctlsocket
send
WSASend
WSARecv
recv
getsockopt
setsockopt
WSAGetLastError
freeaddrinfo
WSACleanup
WSAStartup
closesocket
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 720KB - Virtual size: 720KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ