C:\Users\Administrator\source\repos\ConsoleApplication1\x64\Release\stage.pdb
Static task
static1
Behavioral task
behavioral1
Sample
95e74e6cbe04a88ea131cf2b02238696295337db16013c67482fb4c263f5c4c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
95e74e6cbe04a88ea131cf2b02238696295337db16013c67482fb4c263f5c4c0.exe
Resource
win10v2004-20241007-en
General
-
Target
95e74e6cbe04a88ea131cf2b02238696295337db16013c67482fb4c263f5c4c0
-
Size
14KB
-
MD5
f6670372d5b28d4af1051e640b580ac7
-
SHA1
a9a230565c6680311fa61e2a5d89c14e586828da
-
SHA256
95e74e6cbe04a88ea131cf2b02238696295337db16013c67482fb4c263f5c4c0
-
SHA512
703e31b676e9b5bda34d7d7f0916bd5b20691d0fa44cd8c5dc1ae13a271999a5fa73dc97749c58aabcb7481184ae37ccf4c4ab9cf734002c6b82702ecd23fb26
-
SSDEEP
192:ddzDuTNEMpfPUoYLeUDD23vf7UDFibIkJz/M8lBKpuhW5sQ5g+cqucR0xE:PzDpoyDD23LUDFC4uhss8uE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95e74e6cbe04a88ea131cf2b02238696295337db16013c67482fb4c263f5c4c0
Files
-
95e74e6cbe04a88ea131cf2b02238696295337db16013c67482fb4c263f5c4c0.exe windows:6 windows x64 arch:x64
7d56a6f01da1656861544c04881945e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
VirtualAlloc
Sleep
GetConsoleWindow
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
SetUnhandledExceptionFilter
GetCurrentProcess
RtlCaptureContext
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
user32
ShowWindow
wininet
InternetReadFile
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
InternetConnectW
InternetOpenW
vcruntime140
_CxxThrowException
__C_specific_handler
memset
__current_exception_context
__std_exception_copy
__std_exception_destroy
__current_exception
memcpy
api-ms-win-crt-runtime-l1-1-0
__p___argv
_get_initial_narrow_environment
_crt_atexit
_register_onexit_function
__p___argc
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_c_exit
_set_app_type
_seh_filter_exe
_register_thread_local_exe_atexit_callback
exit
_exit
_cexit
_initterm_e
terminate
_initterm
api-ms-win-crt-heap-l1-1-0
malloc
_set_new_mode
free
_callnewh
realloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ