I:\ZEazeWfFrYkQa\xOyyhVXb\tibfAEAp\zePEsms.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7b5ce8282393462803ad1c0caf89c99c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b5ce8282393462803ad1c0caf89c99c.exe
Resource
win10v2004-20231215-en
General
-
Target
7b5ce8282393462803ad1c0caf89c99c
-
Size
174KB
-
MD5
7b5ce8282393462803ad1c0caf89c99c
-
SHA1
4e47d68f6c7dc401b18a484b554c3d7daad68d03
-
SHA256
a446a5d7a195e75e2d3647b177f2c650f0a2e117e8534df25f7113f5e974291f
-
SHA512
2957bccc8379a27150c193c2b3b0a6ed4f6769d0d6b682bec5e5a44f333321383683fda81d70c0a344fad3b9da6fdc03a4e5b354c529b44ccfedfaff742e12d7
-
SSDEEP
3072:VaMPmwSfBYktQFmrtDvSqE0D1clqyeGmzPyWu8QoA2s0iD6beFM:3OwSnImf0eGmbyW/HAP0/beF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b5ce8282393462803ad1c0caf89c99c
Files
-
7b5ce8282393462803ad1c0caf89c99c.exe windows:5 windows x86 arch:x86
df39f492a4ebc296a08db25185dfbfb9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
OpenDesktopW
ModifyMenuW
MonitorFromRect
GetScrollRange
wsprintfA
ActivateKeyboardLayout
ShowCaret
InvalidateRect
SwitchToThisWindow
wsprintfW
DrawIcon
CharLowerA
keybd_event
GrayStringW
IsWindowVisible
IsDialogMessageW
OemToCharBuffA
AttachThreadInput
CharPrevW
LoadAcceleratorsW
GetScrollInfo
UpdateWindow
DefWindowProcW
RemovePropW
ChildWindowFromPoint
PostMessageW
CharNextA
MessageBoxW
shlwapi
PathRelativePathToA
UrlGetPartA
kernel32
GetFileAttributesExW
GetModuleFileNameA
GetFileAttributesA
GetStartupInfoA
lstrlenA
GetModuleFileNameW
CreateWaitableTimerA
VerifyVersionInfoW
GlobalFlags
GetModuleHandleA
GlobalCompact
lstrcmpA
CreateRemoteThread
IsBadCodePtr
GetCommandLineW
GetVersionExW
OpenSemaphoreW
UnlockFile
ntdll
memset
gdi32
GetTextFaceW
LPtoDP
GetClipBox
GetFontData
EndPage
Escape
Ellipse
BeginPath
SetLayout
ScaleWindowExtEx
SetAbortProc
GetObjectW
PtInRegion
WidenPath
comdlg32
ReplaceTextW
CommDlgExtendedError
GetOpenFileNameA
GetSaveFileNameW
GetFileTitleW
msvcrt
exit
Exports
Exports
?_xt_vhH@@YGPAMD@Z
Sections
.text Size: 163KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.$debug Size: 512B - Virtual size: 99B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data1 Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 586B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ