C:\beg17\n.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9737047a6cf9c18ad4eb8eff4d7b090453dd69d1b64f0c2ffe7a5deab121e637.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9737047a6cf9c18ad4eb8eff4d7b090453dd69d1b64f0c2ffe7a5deab121e637.exe
Resource
win10v2004-20231222-en
General
-
Target
lkhy.zip
-
Size
654KB
-
MD5
4c4207a9421bd7ad788d8bcc18b3a712
-
SHA1
7c5b607f2f149f2c90d28b01b1aeb298e997e52e
-
SHA256
39974fcabb25868f53048b562a7a03792ba7b5771ab6c055b837df920d04b307
-
SHA512
78c7c0bf35b7b55603883bcca77940586cba8defca9d57cc65542a3e205ff936d3db3340eb4cae53b446d5b0454219d77ad6ef66363fae546c64e98758a74e7c
-
SSDEEP
12288:hDy+CVZ6Kz7rxdSpNW2r9Z6i/mJghA7I8EyWKpdGS/IC+GpXLaGZDa/p:hDy+wdzXxZ09kqvuN/GgVDm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9737047a6cf9c18ad4eb8eff4d7b090453dd69d1b64f0c2ffe7a5deab121e637
Files
-
lkhy.zip.zip
Password: infected
-
9737047a6cf9c18ad4eb8eff4d7b090453dd69d1b64f0c2ffe7a5deab121e637.exe windows:5 windows x86 arch:x86
Password: infected
d492b09c073a9c2f77d881ff99fa361e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetComputerNameA
GetTempFileNameW
FindResourceA
GetLocaleInfoA
InterlockedDecrement
GetLogicalDriveStringsW
AddConsoleAliasW
GetTickCount
GetUserDefaultLangID
EnumResourceTypesA
CreateDirectoryExW
GlobalAlloc
GetSystemDirectoryW
GetVolumeInformationA
GlobalFindAtomA
LoadLibraryW
AssignProcessToJobObject
GetConsoleAliasExesLengthW
WriteConsoleW
VerifyVersionInfoW
OpenMutexW
SetLastError
GetProcAddress
VirtualAlloc
HeapSize
SetComputerNameA
LoadLibraryA
GetNumberFormatW
RemoveDirectoryW
SetFileApisToANSI
QueryDosDeviceW
CreateWaitableTimerW
GetConsoleTitleW
VirtualProtect
GetFileAttributesExW
GetCurrentProcessId
GetFileInformationByHandle
DeleteFileA
CreateFileA
GetConsoleOutputCP
WriteConsoleA
GetModuleHandleW
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
GetLastError
ReadFile
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleA
RaiseException
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
SetStdHandle
RtlUnwind
HeapAlloc
HeapReAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
user32
CharUpperBuffW
IsWindowEnabled
winhttp
WinHttpOpen
Sections
.text Size: 653KB - Virtual size: 653KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ