E:\免杀\zero\code\Release\code.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1943ff2403268227b46594daa1bdb8dacfa55b3ebe3be73e516d1423c0c25c5c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1943ff2403268227b46594daa1bdb8dacfa55b3ebe3be73e516d1423c0c25c5c.exe
Resource
win10v2004-20241007-en
General
-
Target
1943ff2403268227b46594daa1bdb8dacfa55b3ebe3be73e516d1423c0c25c5c
-
Size
648KB
-
MD5
e3f56cd2c13de30e6d48a5f384bd2f27
-
SHA1
eb451b9cdc5038bf69fd491a5752790a74ba425d
-
SHA256
1943ff2403268227b46594daa1bdb8dacfa55b3ebe3be73e516d1423c0c25c5c
-
SHA512
560c930b91c95ba81a420bdff3fcd5a355f2b0d5aae6db26c0a9788e3c2fda3a0cba8965d7e431fdb748bf15c800de7defd526b3dce3ca0a9b54bed778718e74
-
SSDEEP
12288:0OHl/LW8WanB1q7XVgJe8UbBVAR4qfZNuG9q5aYgo9C7rCs8Uf8g:0OH5LuanB1algJlUbY3fCG9xYgb/dU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1943ff2403268227b46594daa1bdb8dacfa55b3ebe3be73e516d1423c0c25c5c
Files
-
1943ff2403268227b46594daa1bdb8dacfa55b3ebe3be73e516d1423c0c25c5c.exe windows:5 windows x86 arch:x86
bd63b2372ba4b66cbbfa6b1bd2e93500
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
Sleep
GetProcAddress
EnumSystemGeoID
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
GetStdHandle
GetConsoleCP
FindClose
CreateFileW
IsValidCodePage
GetConsoleMode
LoadLibraryA
CloseHandle
GetCurrentProcessId
SystemTimeToFileTime
FreeLibrary
GetFileType
GetSystemTime
AreFileApisANSI
ReadFile
TryEnterCriticalSection
HeapCreate
HeapFree
EnterCriticalSection
GetFullPathNameW
WriteFile
InterlockedCompareExchange
GetDiskFreeSpaceW
OutputDebugStringA
LockFile
LeaveCriticalSection
InitializeCriticalSection
SetFilePointer
GetFullPathNameA
SetEndOfFile
UnlockFileEx
GetTempPathW
CreateMutexW
WaitForSingleObject
GetFileAttributesW
GetCurrentThreadId
GetVersionExW
UnmapViewOfFile
HeapValidate
HeapSize
GetTempPathA
FormatMessageW
GetDiskFreeSpaceA
GetLastError
GetFileAttributesA
GetFileAttributesExW
OutputDebugStringW
FlushViewOfFile
CreateFileA
WaitForSingleObjectEx
GetVersionExA
DeleteFileA
DeleteFileW
HeapReAlloc
GetSystemInfo
LoadLibraryW
HeapAlloc
HeapCompact
HeapDestroy
UnlockFile
CreateFileMappingA
LocalFree
LockFileEx
GetFileSize
DeleteCriticalSection
GetProcessHeap
GetSystemTimeAsFileTime
FormatMessageA
CreateFileMappingW
MapViewOfFile
QueryPerformanceCounter
GetTickCount
FlushFileBuffers
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
GetStringTypeW
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
QueryPerformanceFrequency
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleFileNameA
GetACP
CompareStringW
LCMapStringW
SetFilePointerEx
DecodePointer
Sections
.text Size: 519KB - Virtual size: 518KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ