C:\pozoyumoz67 torabocax\ruk\dope5.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a29db4694752183337e9e7d3ea231575.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a29db4694752183337e9e7d3ea231575.exe
Resource
win10v2004-20240221-en
General
-
Target
a29db4694752183337e9e7d3ea231575
-
Size
337KB
-
MD5
a29db4694752183337e9e7d3ea231575
-
SHA1
8697ae7faed37d2a0f8846b243e04b437d3c3b1b
-
SHA256
f568d4f2ccb4a31e267f6a84504edd725f5ee08e4d9d8ce51fb3554e30822a4a
-
SHA512
797cf4b84314bf4056d2944092d2648b49437bf92ca29a32ebebb6f6a28c322d8109a2cea9b46f57d013cda8771fbc3692bb037358032f5bb09de87918fd90fa
-
SSDEEP
6144:HkHtDpfsfb+iK60yC45ZwxfnRxm2UAFY5iDdyQ:0Nob+iK60yCu2fTm5A3y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a29db4694752183337e9e7d3ea231575
Files
-
a29db4694752183337e9e7d3ea231575.exe windows:5 windows x86 arch:x86
ecacaa17efbbd9217675f45d4bba87dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnregisterWait
GetFileSize
GetNativeSystemInfo
SetFilePointer
GetConsoleAliasesLengthW
CopyFileExW
SetLocalTime
InterlockedIncrement
InterlockedDecrement
ZombifyActCtx
CompareFileTime
CreateDirectoryW
SetConsoleScreenBufferSize
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
VirtualFree
GetPrivateProfileStringW
SetProcessPriorityBoost
GetPriorityClass
ActivateActCtx
FindResourceExA
LoadLibraryW
GetConsoleAliasExesLengthW
GetVersionExW
InitAtomTable
CreateSemaphoreA
GetFileAttributesW
GetBinaryTypeA
EnumResourceNamesW
CompareStringW
lstrlenW
GlobalUnlock
InterlockedExchange
GetStartupInfoA
GetCPInfoExW
OpenMutexW
GetCurrentDirectoryW
GetProcAddress
CreateNamedPipeA
WriteProfileSectionA
ReadFileEx
DisableThreadLibraryCalls
ResetEvent
LoadLibraryA
GetConsoleScreenBufferInfo
LocalAlloc
SetCurrentDirectoryW
PostQueuedCompletionStatus
FindAtomA
SetEnvironmentVariableA
WriteProfileStringW
FatalAppExitA
GetCurrentThreadId
TlsAlloc
DeleteFileW
LCMapStringW
AreFileApisANSI
GetOverlappedResult
GetComputerNameA
GetLastError
MoveFileA
GetCommandLineA
HeapValidate
IsBadReadPtr
RaiseException
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
GetModuleHandleW
TlsSetValue
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetModuleHandleA
LCMapStringA
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
gdi32
GetBoundsRect
winhttp
WinHttpOpen
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 46.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ