MicroSim 41 Interactive 100% Synthetic Data Learn static & dynamic analysis, IOC extraction, and detection engineering
Load a synthetic malware sample to begin analysis. All data is 100% fabricated for educational purposes.
📄 Load a sample to begin static analysis
| DOS Header | |
|---|---|
| e_magic | 0x5A4D (MZ) |
| e_lfanew | 0x000000F0 |
| PE Signature | |
| Signature | 0x00004550 (PE\0\0) |
| Machine | 0x014C (i386) |
| TimeDateStamp | 0x65A3B1C2 (2025-01-14 08:33:22 UTC) |
| Characteristics | 0x010F (EXECUTABLE_IMAGE | 32BIT) |
| Optional Header | |
|---|---|
| Magic | 0x010B (PE32) |
| AddressOfEntryPoint | 0x00012A40 |
| ImageBase | 0x00400000 |
| SectionAlignment | 0x1000 |
| Subsystem | 0x0003 (WINDOWS_CUI) |
| DllCharacteristics | 0x0000 No ASLR/DEP |
| Checksum | 0x00000000 Invalid |
| Name | Virtual Size | Virtual Addr | Raw Size | Entropy | Flags |
|---|---|---|---|---|---|
.text |
0x00018200 | 0x00001000 | 0x00018400 | 0x60000020 RX |
|
.rdata |
0x00006800 | 0x0001A000 | 0x00006A00 | 0x40000040 R |
|
.data |
0x00002400 | 0x00021000 | 0x00000800 | 0xC0000040 RW |
|
.rsrc |
0x00001200 | 0x00024000 | 0x00001400 | 0x40000040 R ⚠ High Entropy |
|
.reloc |
0x00003600 | 0x00026000 | 0x00003800 | 0x42000040 R ⚠ High Entropy |
|
UPX0 |
0x0000C000 | 0x0002A000 | 0x00000000 | 0xE0000080 RWX ⚠ Packer |
⚠ Sections .rsrc, .reloc, and UPX0 show high entropy (>7.0), indicating packed or encrypted content. UPX0 section name is consistent with UPX packer.
| DLL | Function | Risk | Description |
|---|---|---|---|
kernel32.dll |
VirtualAlloc |
HIGH | Allocates RWX memory — common in shellcode injection |
kernel32.dll |
VirtualProtect |
HIGH | Changes memory protection to executable — DEP bypass |
kernel32.dll |
CreateRemoteThread |
HIGH | Creates thread in another process — process injection |
kernel32.dll |
WriteProcessMemory |
HIGH | Writes to another process memory — code injection |
kernel32.dll |
OpenProcess |
MED | Opens handle to target process for injection |
wininet.dll |
InternetOpenA |
MED | Initializes WinINet — C2 communication |
wininet.dll |
InternetOpenUrlA |
MED | Opens URL for data download/exfiltration |
wininet.dll |
HttpSendRequestA |
MED | Sends HTTP request to C2 server |
advapi32.dll |
CryptEncrypt |
MED | Encrypts data — could be ransomware or C2 encryption |
advapi32.dll |
RegSetValueExA |
MED | Modifies registry — persistence mechanism |
ntdll.dll |
NtUnmapViewOfSection |
HIGH | Hollows target process memory — process hollowing |
▶ Load a sample and run dynamic analysis
🔴 Red-bordered nodes indicate suspicious processes spawned by the sample.
sample_invoice.exe (PID 3284) spawned by explorer.exeIsDebuggerPresent() called — returned FALSEVirtualAlloc(0, 0xC000, MEM_COMMIT|MEM_RESERVE, PAGE_EXECUTE_READWRITE)C:\Users\Public\Documents\svchost_helper.exe (92,160 bytes)%APPDATA%\Microsoft\config.dat (encrypted configuration)HKCU\Software\Microsoft\Windows\CurrentVersion\Run\SvcHelper = "C:\Users\Public\Documents\svchost_helper.exe"HKLM\SYSTEM\CurrentControlSet\Services\SyntheticSvc (service persistence)cmd.exe /c whoami & ipconfig /all (PID 3440) — host reconnaissancepowershell.exe -nop -w hidden -enc [base64] (PID 3612) — encoded command executionc2.example.com → 192.0.2.50hxxp://192.0.2.50/beacon — User-Agent: Mozilla/5.0 (compatible; MSIE 10.0)hxxps://staging.example.com/update — Downloaded 2nd stage payload (48,640 bytes)WriteProcessMemory + CreateRemoteThread into svchost_helper.exe (PID 4012)hxxp://exfil.example.com/upload?id=A3F2 — Encrypted data exfiltration (12,288 bytes)192.0.2.50:443 every ~60 seconds| Time | Protocol | Source | Destination | Info |
|---|---|---|---|---|
| T+3.0s | DNS | 10.0.0.15:54821 | 10.0.0.2:53 | A c2.example.com → 192.0.2.50 |
| T+3.1s | DNS | 10.0.0.15:54822 | 10.0.0.2:53 | A staging.example.com → 198.51.100.20 |
| T+3.2s | HTTP | 10.0.0.15:49201 | 192.0.2.50:80 | POST /beacon (beacon registration, 256 bytes) |
| T+5.5s | HTTPS | 10.0.0.15:49210 | 198.51.100.20:443 | GET /update (stage 2 download, 48,640 bytes) |
| T+9.8s | DNS | 10.0.0.15:54830 | 10.0.0.2:53 | A exfil.example.com → 203.0.113.100 |
| T+10.0s | HTTP | 10.0.0.15:49220 | 203.0.113.100:80 | POST /upload?id=A3F2 (data exfiltration, 12,288 bytes) |
| T+10.1s | DNS | 10.0.0.15:54835 | 10.0.0.2:53 | A fallback.example.com → 192.0.2.75 |
| T+60.0s | HTTPS | 10.0.0.15:49250 | 192.0.2.50:443 | POST /beacon (heartbeat, 128 bytes — recurring) |
| Action | Path | Details |
|---|---|---|
| CREATED | C:\Users\Public\Documents\svchost_helper.exe |
92,160 bytes — persistence payload (dropped binary) |
| CREATED | %APPDATA%\Microsoft\config.dat |
4,096 bytes — encrypted C2 configuration |
| CREATED | %TEMP%\~df4829.tmp |
48,640 bytes — temporary 2nd stage payload |
| MODIFIED | %TEMP%\~df4829.tmp |
File read then deleted after injection |
| DELETED | %TEMP%\~df4829.tmp |
Cleaned up to avoid forensic detection |
| Action | Key | Value | Purpose |
|---|---|---|---|
| SET | HKCU\Software\Microsoft\Windows\CurrentVersion\Run |
SvcHelper = "C:\Users\Public\Documents\svchost_helper.exe" |
Boot persistence (current user) |
| CREATE | HKLM\SYSTEM\CurrentControlSet\Services\SyntheticSvc |
ImagePath = "C:\Users\Public\Documents\svchost_helper.exe" |
Service persistence (requires elevation) |
| SET | HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced |
Hidden = 2 |
Hide hidden files in Explorer |
| SET | HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
EnableLUA = 0 |
Disable UAC prompt (defense evasion) |
🎯 Load a sample to extract IOCs
🛡 Load a sample to generate detection rules