C:\dqvus\pwqoup\qiqk\e9cce3f9a45842c0b0aea74eb91b6c89\dyumzy\itxfnwkx\Release\itxfnwkx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
87e257f64625275fd71560f03bd17fda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
87e257f64625275fd71560f03bd17fda.exe
Resource
win10v2004-20231222-en
General
-
Target
87e257f64625275fd71560f03bd17fda
-
Size
455KB
-
MD5
87e257f64625275fd71560f03bd17fda
-
SHA1
c7c52b21b91e3ebbd04bf79b82760fb5a675a23c
-
SHA256
211264228b4b89516826c0e3260ac472146d4e0e93c58d0b892988786288f860
-
SHA512
b1ba664d28d312ff8246721f34e12e02b93ea0187e96330520cceffa57de326fbc73993b1f565b59447a5be3bc6b92c2babe4890c677b74a0687ef0e354c95e3
-
SSDEEP
12288:9gTn0oVJoQ2jup1YDqP1Y+NM2RPDrhDBE:9gTn0ocfjuCq9a2xrhS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 87e257f64625275fd71560f03bd17fda
Files
-
87e257f64625275fd71560f03bd17fda.exe windows:6 windows x86 arch:x86
e9aef503b3e4a8eb831af674be5da9e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateFileW
CreateHardLinkW
CreateProcessW
CreateSymbolicLinkW
DecodePointer
DeleteCriticalSection
DeleteFileW
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetTimeFormatW
GetVolumeInformationW
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LocalAlloc
LocalFree
MoveFileExW
MoveFileW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
RemoveDirectoryW
RtlUnwind
SearchPathW
SetConsoleCursorPosition
SetConsoleMode
SetConsoleTextAttribute
SetConsoleTitleW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SetVolumeLabelW
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
user32
CharNextExA
CharUpperBuffW
GetDC
GrayStringA
IsCharAlphaNumericW
IsCharAlphaW
LoadStringW
MessageBoxA
wsprintfW
shell32
FindExecutableW
SHFileOperationW
SHGetFileInfoW
advapi32
GetFileSecurityW
GetSecurityDescriptorOwner
LookupAccountSidW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.voltbl Size: 512B - Virtual size: 97B
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ