| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2024-Nov-07 22:53:30 |
| Detected languages |
English - United States
|
| CompanyName | Microsoft Corporation |
| FileDescription | waitfor - wait/send a signal over a network |
| FileVersion | 10.0.22621.1 (WinBuild.160101.0800) |
| InternalName | waitfor.exe |
| LegalCopyright | © Microsoft Corporation. All rights reserved. |
| OriginalFilename | waitfor.exe |
| ProductName | Microsoft® Windows® Operating System |
| ProductVersion | 10.0.22621.1 |
| Info | Cryptographic algorithms detected in the binary: | Uses constants related to CRC32 |
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Malicious | The PE's digital signature is invalid. |
Signer: Akeo Consulting
Issuer: Sectigo Public Code Signing CA EV R36 The file was modified after it was signed. |
| Malicious | VirusTotal score: 45/72 (Scanned on 2026-04-23 18:28:17) |
ALYac:
Gen:Variant.Application.FCA.3351
APEX: Malicious AVG: Win32:Agent-BDOJ [Trj] AhnLab-V3: Trojan/Win.Generic.R683382 Arcabit: Trojan.Application.FCA.DD17 Avast: Win32:Agent-BDOJ [Trj] Avira: TR/Crypt.FKM.Gen BitDefender: Gen:Variant.Application.FCA.3351 Bkav: W64.AIDetectMalware CTX: exe.trojan.generic CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS DrWeb: Python.Packed.104 ESET-NOD32: Win64/Packed.PyInstaller.O suspicious application Elastic: malicious (high confidence) Emsisoft: Gen:Variant.Application.FCA.3351 (B) F-Secure: Trojan.TR/Crypt.FKM.Gen Fortinet: Python/Blank.C!tr GData: Gen:Variant.Application.FCA.3351 Google: Detected Ikarus: Trojan-Spy.BlankC K7AntiVirus: Trojan ( 005c34b91 ) K7GW: Trojan ( 005c34b91 ) Kaspersky: Trojan-Spy.Win32.Agent.dffz Kingsoft: Win32.Trojan-Spy.Agent.dffz Lionic: Trojan.Win32.Agent.Y!c Malwarebytes: Spyware.BlankGrabber McAfeeD: Trojan:Win/InfoStealer.AB MicroWorld-eScan: Gen:Variant.Application.FCA.3351 Microsoft: Trojan:Win32/Wacatac.B!ml Paloalto: generic.ml Rising: Spyware.Agent/PYC!1.EA8F (CLOUD) SentinelOne: Static AI - Malicious PE Skyhigh: BehavesLike.Win64.Dropper.rc Sophos: Mal/Generic-S Symantec: Scr.Malcode!gen129 Tencent: Trojan.Python.Agent.16001322 TrellixENS: Artemis!E8198192AC0C VBA32: TrojanSpy.Agent VIPRE: Gen:Variant.Application.FCA.3351 Varist: W64/Agent.IMI.gen!Eldorado alibabacloud: Trojan[spy]:Win/Sabsik.TA huorong: Trojan/Python.ShellLoader.cx |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0xf8 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 6 |
| TimeDateStamp | 2024-Nov-07 22:53:30 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x2a000 |
| SizeOfInitializedData | 0x17000 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x000000000000CDB0 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x49000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x866093 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x1e8480 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| USER32.dll |
CreateWindowExW
ShutdownBlockReasonCreate MsgWaitForMultipleObjects ShowWindow DestroyWindow RegisterClassW DefWindowProcW PeekMessageW DispatchMessageW TranslateMessage PostMessageW GetMessageW MessageBoxW MessageBoxA SystemParametersInfoW DestroyIcon SetWindowLongPtrW GetWindowLongPtrW GetClientRect InvalidateRect ReleaseDC GetDC DrawTextW GetDialogBaseUnits EndDialog DialogBoxIndirectParamW MoveWindow SendMessageW |
|---|---|
| COMCTL32.dll |
#380
|
| KERNEL32.dll |
GetACP
IsValidCodePage GetStringTypeW GetFileAttributesExW SetEnvironmentVariableW FlushFileBuffers GetCurrentDirectoryW LCMapStringW CompareStringW FlsFree GetOEMCP GetCPInfo GetModuleHandleW MulDiv FormatMessageW GetLastError GetModuleFileNameW LoadLibraryExW SetDllDirectoryW CreateSymbolicLinkW GetProcAddress GetEnvironmentStringsW GetCommandLineW GetEnvironmentVariableW ExpandEnvironmentStringsW DeleteFileW FindClose FindFirstFileW FindNextFileW GetDriveTypeW RemoveDirectoryW GetTempPathW CloseHandle QueryPerformanceCounter QueryPerformanceFrequency WaitForSingleObject Sleep GetCurrentProcess TerminateProcess GetExitCodeProcess CreateProcessW GetStartupInfoW FreeLibrary LocalFree SetConsoleCtrlHandler K32EnumProcessModules K32GetModuleFileNameExW CreateFileW FindFirstFileExW GetFinalPathNameByHandleW MultiByteToWideChar WideCharToMultiByte FlsSetValue FreeEnvironmentStringsW GetProcessHeap GetTimeZoneInformation HeapSize HeapReAlloc WriteConsoleW SetEndOfFile CreateDirectoryW RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind UnhandledExceptionFilter SetUnhandledExceptionFilter IsProcessorFeaturePresent GetCurrentProcessId GetCurrentThreadId GetSystemTimeAsFileTime InitializeSListHead IsDebuggerPresent RtlUnwindEx SetLastError EnterCriticalSection LeaveCriticalSection DeleteCriticalSection InitializeCriticalSectionAndSpinCount TlsAlloc TlsGetValue TlsSetValue TlsFree EncodePointer RaiseException RtlPcToFileHeader GetCommandLineA GetFileInformationByHandle GetFileType PeekNamedPipe SystemTimeToTzSpecificLocalTime FileTimeToSystemTime ReadFile GetFullPathNameW SetStdHandle GetStdHandle WriteFile ExitProcess GetModuleHandleExW HeapFree GetConsoleMode ReadConsoleW SetFilePointerEx GetConsoleOutputCP GetFileSizeEx HeapAlloc FlsAlloc FlsGetValue |
| ADVAPI32.dll |
OpenProcessToken
GetTokenInformation ConvertStringSecurityDescriptorToSecurityDescriptorW ConvertSidToStringSidW |
| GDI32.dll |
SelectObject
DeleteObject CreateFontIndirectW |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 10.0.22621.1 |
| ProductVersion | 10.0.22621.1 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | English - United States |
| CompanyName | Microsoft Corporation |
| FileDescription | waitfor - wait/send a signal over a network |
| FileVersion (#2) | 10.0.22621.1 (WinBuild.160101.0800) |
| InternalName | waitfor.exe |
| LegalCopyright | © Microsoft Corporation. All rights reserved. |
| OriginalFilename | waitfor.exe |
| ProductName | Microsoft® Windows® Operating System |
| ProductVersion (#2) | 10.0.22621.1 |
| Resource LangID | UNKNOWN |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2024-Nov-07 22:53:30 |
| Version | 0.0 |
| SizeofData | 796 |
| AddressOfRawData | 0x3a474 |
| PointerToRawData | 0x39874 |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x14003e040 |
| GuardCFCheckFunctionPointer | 5368886432 |
| GuardCFDispatchFunctionPointer | 0 |
| GuardCFFunctionTable | 0 |
| GuardCFFunctionCount | 0 |
| GuardFlags | (EMPTY) |
| CodeIntegrity.Flags | 0 |
| CodeIntegrity.Catalog | 0 |
| CodeIntegrity.CatalogOffset | 0 |
| CodeIntegrity.Reserved | 0 |
| GuardAddressTakenIatEntryTable | 0 |
| GuardAddressTakenIatEntryCount | 0 |
| GuardLongJumpTargetTable | 0 |
| GuardLongJumpTargetCount | 0 |
| XOR Key | 0x5afe5c2a |
|---|---|
| Unmarked objects | 0 |
| ASM objects (30795) | 7 |
| C++ objects (30795) | 180 |
| C objects (30795) | 10 |
| 253 (33808) | 3 |
| ASM objects (33808) | 9 |
| C objects (33808) | 17 |
| C++ objects (33808) | 40 |
| Imports (30795) | 11 |
| Total imports | 155 |
| C objects (34120) | 25 |
| Linker (34120) | 1 |
No comments yet.