c:\yes\Safe\dollar\came\door\wife\coolPay.pdb
Static task
static1
Behavioral task
behavioral1
Sample
98c4231be0e4b12a1373308eb63e71a2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98c4231be0e4b12a1373308eb63e71a2.exe
Resource
win10v2004-20231215-en
General
-
Target
98c4231be0e4b12a1373308eb63e71a2
-
Size
600KB
-
MD5
98c4231be0e4b12a1373308eb63e71a2
-
SHA1
4b4eb5e80197a72a7c302d998f0c8bcd4722482d
-
SHA256
1c9a8bea617bdd72dc972cc94c9a3c2697df5df9c321ff669992e24b9d5407c1
-
SHA512
07bd9938b8042c22119e20e767b3094fff77332a5d4a3291087d65f771bd5d1e37eb256fb71a18599168db24e75407493b152168a6b8b176169db31b3891e78a
-
SSDEEP
6144:c8Vg2hXrgNGXgYsB42/d4YL0njL066ePGHG5etDSKW6EfbjYyc8sWAg2LoZ7WP78:HgjwXgYsB428U65P3Nj3bC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98c4231be0e4b12a1373308eb63e71a2
Files
-
98c4231be0e4b12a1373308eb63e71a2.exe windows:5 windows x86 arch:x86
b3b00afa8b4eba4a79f817aa44ee04cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileTime
GetCurrentThreadId
GetCurrentProcessId
CreateFileA
GetLocaleInfoW
SetStdHandle
GetCurrentDirectoryA
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetModuleFileNameA
LoadLibraryA
RemoveDirectoryA
GetProcAddress
CreateProcessA
GetSystemDirectoryA
GetFileAttributesA
Sleep
MoveFileExA
WriteConsoleW
ExitProcess
GetStringTypeA
GetLocaleInfoA
HeapSize
CloseHandle
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
GetTickCount
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RaiseException
GetLastError
HeapFree
RtlUnwind
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetACP
GetOEMCP
IsValidCodePage
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
ole32
CoTaskMemFree
CoInitialize
CLSIDFromString
CoUninitialize
CoCreateInstance
CoTaskMemAlloc
user32
SendMessageA
SetClipboardData
CheckRadioButton
GetClipboardData
SetDlgItemInt
GetScrollRange
InsertMenuItemA
SetForegroundWindow
SendDlgItemMessageA
GetDlgItemInt
gdi32
DeleteDC
CreateDCA
DPtoLP
GetObjectA
BitBlt
comctl32
ImageList_Create
ImageList_EndDrag
ImageList_DragEnter
ImageList_GetImageCount
wininet
InternetCanonicalizeUrlA
InternetOpenUrlA
InternetQueryDataAvailable
InternetCrackUrlA
InternetReadFile
InternetWriteFile
InternetOpenA
InternetCloseHandle
InternetQueryOptionA
rasapi32
RasHangUpA
RasEnumConnectionsA
RasGetConnectStatusA
Sections
.text Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 424KB - Virtual size: 423KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ