Slawd.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e269d201f53e7dde01daa3ef1206b7fd29294216f01cb569843ab8b210b95cfc.exe
Resource
win10v2004-20250313-en
General
-
Target
e269d201f53e7dde01daa3ef1206b7fd29294216f01cb569843ab8b210b95cfc.exe
-
Size
4.8MB
-
MD5
72d071507b3581f785d7717eb4558917
-
SHA1
2bb0a4b8a8d1182f1061586696330f5feaa2a122
-
SHA256
e269d201f53e7dde01daa3ef1206b7fd29294216f01cb569843ab8b210b95cfc
-
SHA512
5bbac0741bd562fcc3f077728b77328ec877e1821984aaa99feb47c707fe2a9e03bda2c24e47cbe4dc2b9099566ad8dc707f10544677867ba58d675936fa10d7
-
SSDEEP
3072:1ExqxObDe3ftbNzxWR5iWEGdqlncrOPlqAuxoyUhYaKzEfldn81/hvIfjB4zudYt:1vOHevtNlWulncONqAIoyzPw5Bm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e269d201f53e7dde01daa3ef1206b7fd29294216f01cb569843ab8b210b95cfc.exe
Files
-
e269d201f53e7dde01daa3ef1206b7fd29294216f01cb569843ab8b210b95cfc.exe.exe windows:6 windows x64 arch:x64
bdc22efce5198e5aef6f4ba2cb7253bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-synch-l1-2-0
WaitOnAddress
WakeByAddressAll
WakeByAddressSingle
bcryptprimitives
ProcessPrng
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
InitializeSListHead
LoadLibraryW
GetProcAddress
FreeLibrary
CloseHandle
GetLastError
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetCurrentThread
CreateWaitableTimerExW
SetWaitableTimer
WaitForSingleObject
Sleep
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
GetCurrentProcess
GetStdHandle
GetCurrentProcessId
SetHandleInformation
GetProcessHeap
HeapFree
HeapReAlloc
lstrlenW
ReleaseMutex
GetModuleHandleW
FormatMessageW
GetModuleHandleA
HeapAlloc
GetConsoleMode
IsProcessorFeaturePresent
GetConsoleOutputCP
MultiByteToWideChar
WriteConsoleW
WideCharToMultiByte
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetSystemTimeAsFileTime
GetCurrentThreadId
ntdll
NtWriteFile
RtlNtStatusToDosError
ws2_32
WSASocketW
getaddrinfo
bind
sendto
recvfrom
closesocket
setsockopt
WSAGetLastError
freeaddrinfo
WSACleanup
WSAStartup
vcruntime140
__current_exception
__current_exception_context
__C_specific_handler
_CxxThrowException
memcmp
memmove
__CxxFrameHandler3
memset
memcpy
api-ms-win-crt-runtime-l1-1-0
_initterm_e
exit
_exit
_initterm
_get_initial_narrow_environment
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_configure_narrow_argv
__p___argc
_initialize_onexit_table
_initialize_narrow_environment
_register_onexit_function
_crt_atexit
terminate
_set_app_type
_seh_filter_exe
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 529KB - Virtual size: 528KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ