windows_shellcode_loader.pdb
Static task
static1
General
-
Target
windows_shellcode_loader.exe
-
Size
1.8MB
-
MD5
880a88bc4d6883b288e9fe5991396afc
-
SHA1
f448f7266c97e98fb8fdfa90d33ad775ee8ac3cc
-
SHA256
2437709b8e2f53f242849d6b45ebabd03226ee70d508926746989c368ffc3df7
-
SHA512
16d4014a54a416785fe2d784370a839c4fd56c6bc394f68edea3dc02b9e9bf0891f4f4a286ce874de1e41262a7debdd15ddf3b05d146851c083ac5f2a7bd0a44
-
SSDEEP
49152:a2LkiBtAvvAEF5+sFrguhJ2B+qVIUZKrhpE94IU6i:eFjODFH+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource windows_shellcode_loader.exe
Files
-
windows_shellcode_loader.exe.exe windows:6 windows x64 arch:x64
0d04c5795b70ce371e6c5cf2c6ddfc12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
api-ms-win-core-synch-l1-2-0
WaitOnAddress
WakeByAddressAll
WakeByAddressSingle
bcryptprimitives
ProcessPrng
bcrypt
BCryptGenRandom
advapi32
GetTokenInformation
OpenProcessToken
SystemFunction036
kernel32
SetUnhandledExceptionFilter
InitializeSListHead
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
HeapReAlloc
GetCurrentProcess
WaitForMultipleObjects
GetOverlappedResult
GetLastError
VirtualAlloc
VirtualProtect
WaitForSingleObject
GetExitCodeProcess
AddVectoredExceptionHandler
SetThreadStackGuarantee
GetCurrentThread
GetSystemTimePreciseAsFileTime
SetLastError
GetCurrentDirectoryW
RtlCaptureContext
RtlLookupFunctionEntry
WaitForSingleObjectEx
LoadLibraryA
GetProcAddress
lstrlenW
GetCurrentProcessId
CreateMutexA
ReleaseMutex
RtlVirtualUnwind
WideCharToMultiByte
GetStdHandle
GetConsoleMode
GetConsoleOutputCP
MultiByteToWideChar
WriteConsoleW
GetEnvironmentVariableW
GetModuleHandleA
CreateWaitableTimerExW
SetWaitableTimer
Sleep
QueryPerformanceFrequency
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
GetCommandLineW
GetFullPathNameW
CreateFileW
SetFileInformationByHandle
GetFileInformationByHandle
GetFileInformationByHandleEx
ReadConsoleW
SetHandleInformation
GetEnvironmentStringsW
FreeEnvironmentStringsW
CompareStringOrdinal
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
DuplicateHandle
CreateNamedPipeW
CreateThread
WriteFileEx
SleepEx
ReadFileEx
CreateEventW
CancelIo
ReadFile
ExitProcess
QueryPerformanceCounter
TerminateProcess
GetCurrentThreadId
shell32
ShellExecuteW
ntdll
RtlNtStatusToDosError
NtWriteFile
NtReadFile
ws2_32
freeaddrinfo
WSASocketW
getsockopt
setsockopt
recv
WSARecv
WSACleanup
getpeername
getsockname
WSADuplicateSocketW
ioctlsocket
send
connect
accept
select
bind
WSAStartup
getaddrinfo
closesocket
WSAGetLastError
listen
WSASend
vcruntime140
__current_exception
__current_exception_context
__C_specific_handler
memmove
memset
__CxxFrameHandler3
memcpy
memcmp
api-ms-win-crt-runtime-l1-1-0
exit
_exit
_initterm_e
__p___argc
__p___argv
_initterm
_c_exit
_register_thread_local_exe_atexit_callback
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
_cexit
_seh_filter_exe
_set_app_type
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 550KB - Virtual size: 549KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ