D:\Proj\MegaCrypt\MegaCrypt\x64\Release\MegaCrypt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.PWSX-gen.1991.8598.exe
Resource
win7-20240903-en
General
-
Target
SecuriteInfo.com.Win64.PWSX-gen.1991.8598.exe
-
Size
1.2MB
-
MD5
2d4f0b8cea31ef6f54f5031002068197
-
SHA1
60debe454499d6a0cdfbbadc2bdb95ef0dd258db
-
SHA256
6a284685cdd9487e12b06033a92532d28d5979df3dd99359d2f50afb92e39890
-
SHA512
241a71a2837936195b453cdc61509bd58bb684d67e91b7977a87cada337ad6be4651342892ded2edeada1d4cb74e3946c42032007a11ee1f686fda287cd5c401
-
SSDEEP
24576:ZyCz1AhEdt1yB2h0lhSMXlcTQm40HZDhaufsGmwgQQ/jmGrQOr:Zl1hdtU5OtJhHnedr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.Win64.PWSX-gen.1991.8598.exe
Files
-
SecuriteInfo.com.Win64.PWSX-gen.1991.8598.exe.exe windows:6 windows x64 arch:x64
582f3ef3293023770da35c6a3f5f7112
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntdll
RtlGetNtVersionNumbers
RtlLeaveCriticalSection
RtlEnterCriticalSection
RtlCompareMemory
NtProtectVirtualMemory
RtlImageNtHeader
NtQueryVirtualMemory
RtlImageDirectoryEntryToData
kernel32
GetConsoleOutputCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
LCMapStringEx
VirtualFree
VirtualAlloc
GetModuleHandleW
LoadLibraryA
ReadFile
WriteFile
CreateFileW
CloseHandle
GetProcAddress
GetCurrentProcess
VirtualQuery
IsDebuggerPresent
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
K32EnumDeviceDrivers
K32GetDeviceDriverBaseNameW
GetModuleFileNameW
MultiByteToWideChar
ExitProcess
WideCharToMultiByte
GetLastError
SetLastError
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
GetCurrentThreadId
GetStdHandle
GetFileType
GetStartupInfoW
RaiseException
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
FreeLibrary
LoadLibraryExW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
SetEndOfFile
GetConsoleMode
ReadConsoleW
HeapReAlloc
HeapSize
GetProcessHeap
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
GetModuleHandleExW
SetStdHandle
WriteConsoleW
QueryPerformanceCounter
GetCurrentProcessId
InitializeSListHead
RtlUnwindEx
RtlUnwind
RtlPcToFileHeader
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
DecodePointer
InitializeCriticalSectionEx
GetFileInformationByHandleEx
FormatMessageA
LocalFree
GetLocaleInfoEx
FindClose
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
user32
LoadAcceleratorsA
GetSystemMetrics
GetRawInputDeviceInfoW
GetRawInputDeviceList
LoadAcceleratorsW
Sections
.text Size: 336KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 849KB - Virtual size: 848KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ