fZKdHttZ.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8d01d3f47fe411cc98d37ddded1b5d5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d01d3f47fe411cc98d37ddded1b5d5d.exe
Resource
win10v2004-20231215-en
General
-
Target
8d01d3f47fe411cc98d37ddded1b5d5d
-
Size
929KB
-
MD5
8d01d3f47fe411cc98d37ddded1b5d5d
-
SHA1
618edcc50da3e2ecfed849028b129b1468faba36
-
SHA256
9b1b74a00071c9effdc89a20141bac2a6d8e33486e634a9074638817e02cc639
-
SHA512
914ecfbe3181c5a3610f1505e0e1ddaa5690185826c157b0ae9c487f4ea263e94c1bef4f44155b515b51abc98380d831f2f9205fdad9634d001f5f4a407d9a41
-
SSDEEP
24576:00bbvjiJ1vOUqgZSQKh5q1B+EChdWCJ4CsnfZz9Q:rbz+MUkD7q1BmahCsnfZhQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d01d3f47fe411cc98d37ddded1b5d5d
Files
-
8d01d3f47fe411cc98d37ddded1b5d5d.exe windows:5 windows x86 arch:x86
b869342af90eed3dce2dc1b19a3bd1df
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
ReadFile
VirtualFree
VirtualAlloc
CreateFileA
CloseHandle
SwitchToThread
CreateThread
OpenThread
GetCurrentThreadId
user32
KillTimer
SetTimer
DestroyWindow
CreateWindowExA
CloseClipboard
EmptyClipboard
OpenClipboard
FindWindowA
ole32
CoInitialize
CoUninitialize
dhcpcsvc
DhcpRequestParams
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 145KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 21B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ