X:\BualKzjVha\gGgnjaeOkH\BhksPfowyFlAKx\bkgXhcsevk\VictnKL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab028b215246fa42f1f700af7ce490eb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab028b215246fa42f1f700af7ce490eb.exe
Resource
win10v2004-20240226-en
General
-
Target
ab028b215246fa42f1f700af7ce490eb
-
Size
148KB
-
MD5
ab028b215246fa42f1f700af7ce490eb
-
SHA1
2f2ded652e72bfbf4c081f1a3ab9b18a7e079c17
-
SHA256
15c63614aad6a6db91a8bea97f3074c94f25bf4ea34dc5e0efb75540fe60ef4e
-
SHA512
83f886d93ba36f77e01336e8e9a06052d615bb46c426cfa609158b79bc3e847428ab091a33769f297a7a9cc117342dfdcf0a80b87d8e7ad606db975b5afa9a90
-
SSDEEP
3072:YwCnQVNeMfC/BQcQl3u/CUHpxDgREcDYH8ss8zm4CXzw:YXQqMfu/KUJxMREUYH8ss8FCX8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab028b215246fa42f1f700af7ce490eb
Files
-
ab028b215246fa42f1f700af7ce490eb.exe windows:5 windows x86 arch:x86
6ad829678388664c170b632b031c8376
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
OpenBackupEventLogW
user32
CopyAcceleratorTableW
GetPropW
MapWindowPoints
mouse_event
PostMessageW
FrameRect
LoadStringA
GetUserObjectInformationA
KillTimer
CharToOemBuffA
GetWindowTextLengthW
GetKeyboardLayout
GetKeyboardLayoutNameW
CreateDialogParamW
InflateRect
TranslateAcceleratorA
ScrollWindow
ChildWindowFromPoint
GetClassInfoExA
FindWindowExA
EnableMenuItem
GetDialogBaseUnits
AdjustWindowRectEx
SetCaretPos
InvalidateRect
IsRectEmpty
HiliteMenuItem
CharNextA
GetMenuState
OpenDesktopW
AttachThreadInput
SendMessageTimeoutA
SetWindowRgn
GetSystemMetrics
DrawFrameControl
SendInput
GetDlgItemTextW
EndPaint
GetDoubleClickTime
ModifyMenuW
OffsetRect
TranslateAcceleratorW
gdi32
CreateDiscardableBitmap
SetTextAlign
GetCurrentObject
PtInRegion
StartPage
Escape
PolyBezier
SetDIBits
RoundRect
MoveToEx
CreatePolygonRgn
EnumFontFamiliesExW
GetViewportOrgEx
SetWindowExtEx
CreatePenIndirect
CreatePalette
SetAbortProc
Rectangle
shlwapi
ord157
ord29
StrStrIA
comctl32
ImageList_GetIcon
ImageList_GetImageCount
ImageList_AddMasked
kernel32
lstrlenW
SetEndOfFile
GetTimeFormatA
SetFilePointer
LocalFree
RemoveDirectoryW
GetThreadContext
OpenFileMappingA
CancelWaitableTimer
TryEnterCriticalSection
GetCommModemStatus
lstrcpyW
ReleaseMutex
SetEvent
EscapeCommFunction
WaitCommEvent
FlushFileBuffers
SetFileAttributesW
LCMapStringW
IsDBCSLeadByte
CompareFileTime
msvcrt
_controlfp
wcscpy
__set_app_type
__p__fmode
__p__commode
fputs
_amsg_exit
mbstowcs
_initterm
printf
_acmdln
exit
getenv
_ismbblead
_XcptFilter
_exit
_cexit
wcstombs
strtol
realloc
islower
__setusermatherr
toupper
__getmainargs
isalnum
clock
Exports
Exports
?OnFullNameEx@@YGPAXDPADPAM*Z
?GetHeaderOld@@YGMEED*Z
?IncrementFileExW@@YGXF*Z
?DecrementHeaderOld@@YGPAIMG*Z
?HidePenA@@YGPAMNPAK*Z
?CrtClassNew@@YGXF*Z
?FindOptionW@@YGEJ*Z
?FormatModuleOld@@YGXE*Z
?ModifyProjectOriginal@@YGKPAJ*Z
?ShowAppNameOld@@YGPANPAFJJI*Z
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.etdir Size: 512B - Virtual size: 433B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.itdir Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vtdir Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ptdir Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.stdir Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ