D:\AUOEZL\EOEX\MYOZ\DMZMMU\UZVNT.PDB
Static task
static1
Behavioral task
behavioral1
Sample
a4054d8399bdbe0e646cfed0810b5a6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4054d8399bdbe0e646cfed0810b5a6e.exe
Resource
win10v2004-20240221-en
General
-
Target
a4054d8399bdbe0e646cfed0810b5a6e
-
Size
344KB
-
MD5
a4054d8399bdbe0e646cfed0810b5a6e
-
SHA1
a290533c4f05e127d8e30436ca41cc3243f61732
-
SHA256
1cc525f4e5d60fe19981a4b50574eabbc971a0d5479929a78a366d0a9b527cb7
-
SHA512
a275102a52dda45673bd4cd5ed25894b9306c3d589b311f8d01e56ad8fc92787d99069e556342ba5688cb3e30b337a72758539be613c3914ac43c93befc1d816
-
SSDEEP
6144:RsRyhem8oZD+uSy5xGZrGkj7kl0jlDmvtgNZWoRx42FrdM0OX:RsRyqoF/L5YhGmjsExH42ddM0O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4054d8399bdbe0e646cfed0810b5a6e
Files
-
a4054d8399bdbe0e646cfed0810b5a6e.exe windows:4 windows x86 arch:x86
b19ee1f3df89af79173fb41d8e160b5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapAlloc
SetLastError
CompareStringA
GetEnvironmentStringsW
GetOEMCP
ExitProcess
GetLocalTime
GetDriveTypeW
LCMapStringW
AddAtomW
GetCurrentThread
TlsAlloc
QueryPerformanceCounter
HeapDestroy
InterlockedExchange
GetFileType
LCMapStringA
SetFilePointer
GetSystemTime
SetStdHandle
GetStringTypeA
OpenFileMappingA
SetEnvironmentVariableA
LoadLibraryA
GetCPInfo
WideCharToMultiByte
VirtualFree
VirtualAlloc
HeapCreate
OpenMutexA
GetEnvironmentStrings
FreeEnvironmentStringsA
EnterCriticalSection
GetModuleHandleA
GetLastError
SystemTimeToFileTime
VirtualQuery
InitializeCriticalSection
GetStdHandle
GetCurrentThreadId
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
GetCommandLineA
UnhandledExceptionFilter
TlsSetValue
GetModuleFileNameA
FlushFileBuffers
SetHandleCount
GetVolumeInformationA
WriteProfileSectionW
DeleteCriticalSection
InterlockedIncrement
IsBadWritePtr
ReadFile
HeapReAlloc
FlushViewOfFile
TlsGetValue
GetVersion
SetLocaleInfoA
TlsFree
CreateMutexA
WriteConsoleW
RtlUnwind
InterlockedDecrement
GetSystemTimeAsFileTime
CompareStringW
GetTickCount
GetProcAddress
WriteFile
GetTimeZoneInformation
GetACP
HeapFree
GetStartupInfoA
FreeEnvironmentStringsW
LeaveCriticalSection
GetThreadPriority
GetStringTypeW
GetCurrentProcessId
CloseHandle
shell32
ShellExecuteA
ShellAboutA
DragQueryFileA
user32
ShowOwnedPopups
EnumPropsW
ShowWindow
GetWindowLongW
DestroyWindow
CreateWindowExW
EndDeferWindowPos
SetDlgItemInt
CharPrevA
CharLowerW
DlgDirListA
MessageBoxW
DefWindowProcW
GetClipCursor
DdeInitializeA
IsDialogMessage
KillTimer
DefMDIChildProcA
RegisterClassA
GetMonitorInfoA
RegisterClassExA
GetKeyboardLayout
GetFocus
comctl32
ImageList_Merge
CreatePropertySheetPageA
ImageList_GetImageInfo
ImageList_Duplicate
_TrackMouseEvent
ImageList_GetIcon
ImageList_AddMasked
ImageList_SetDragCursorImage
ImageList_EndDrag
InitCommonControlsEx
Sections
.text Size: 156KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ