miansha1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6a0a4606e8d3a41ee5d843b52124cf192890ce716707b882fc222934abc11cd2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a0a4606e8d3a41ee5d843b52124cf192890ce716707b882fc222934abc11cd2.exe
Resource
win10v2004-20241007-en
General
-
Target
6a0a4606e8d3a41ee5d843b52124cf192890ce716707b882fc222934abc11cd2
-
Size
385KB
-
MD5
f4c67bfe6335898e0bfebd4b88709c94
-
SHA1
445e171f37b6812e1337cbebd493eea4cb2927d4
-
SHA256
6a0a4606e8d3a41ee5d843b52124cf192890ce716707b882fc222934abc11cd2
-
SHA512
adb77f9b48d600403d816621f4b89b124ef04e808fd751cddecdd0daffa5d42ef8c6469f77a867f1d8df7d7127302091dcf418880401a0cdf2dcfe2c24b8df1a
-
SSDEEP
6144:IOwaSYqC+Be8rUMAP+dMVbG7CdFq4PDMGB+aZyNGPiBK73SRTo9x:IvnAHPLVbG7qFjMGBcYiBK72k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a0a4606e8d3a41ee5d843b52124cf192890ce716707b882fc222934abc11cd2
Files
-
6a0a4606e8d3a41ee5d843b52124cf192890ce716707b882fc222934abc11cd2.exe windows:6 windows x64 arch:x64
c73b76d939fcfb0b90c9b82459392636
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-synch-l1-2-0
WaitOnAddress
WakeByAddressAll
WakeByAddressSingle
kernel32
GetProcAddress
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
VirtualAlloc
VirtualProtect
CloseHandle
GetLastError
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetCurrentThread
WaitForSingleObject
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
GetCurrentProcess
GetStdHandle
GetCurrentProcessId
HeapFree
HeapReAlloc
lstrlenW
ReleaseMutex
GetConsoleMode
GetModuleHandleW
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
GetModuleHandleA
IsProcessorFeaturePresent
GetProcessHeap
HeapAlloc
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetSystemTimeAsFileTime
GetCurrentThreadId
ntdll
RtlNtStatusToDosError
NtWriteFile
vcruntime140
__current_exception
__current_exception_context
__C_specific_handler
_CxxThrowException
memcmp
memmove
memset
__CxxFrameHandler3
memcpy
api-ms-win-crt-runtime-l1-1-0
_initterm_e
exit
_exit
_initterm
_get_initial_narrow_environment
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
__p___argc
_initialize_onexit_table
_initialize_narrow_environment
_register_onexit_function
_crt_atexit
terminate
_set_app_type
_seh_filter_exe
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 286KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 664B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ