C:\tiz\32\sowagire\91-dikeraw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e6c6ad948e9ad054f789500a6fda9485c861af7b48ae04001a8fc555ac0b3be5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e6c6ad948e9ad054f789500a6fda9485c861af7b48ae04001a8fc555ac0b3be5.exe
Resource
win10v2004-20240226-en
General
-
Target
e6c6ad948e9ad054f789500a6fda9485c861af7b48ae04001a8fc555ac0b3be5.exe
-
Size
744KB
-
MD5
175440137997a9ddee8d55496d31e931
-
SHA1
30fee56d96dd9fdeb293024c1f25ef1bc524ff39
-
SHA256
e6c6ad948e9ad054f789500a6fda9485c861af7b48ae04001a8fc555ac0b3be5
-
SHA512
e018e2691ba479634b334fd70a08bbbce11ed4d7ed7f7afdd8ad103b6c57cde3c9284935b61cc3fdf92d8ed885de6926d3a9ab5f69d77adc4fe2e9fba6120c71
-
SSDEEP
12288:nmZnWX/XgipyUBkGJSfxLgK5a+xbsp5ygBQphnnVV1Gn1zDjeyx:mUvX/TCGwNjNgSpfMXx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e6c6ad948e9ad054f789500a6fda9485c861af7b48ae04001a8fc555ac0b3be5.exe
Files
-
e6c6ad948e9ad054f789500a6fda9485c861af7b48ae04001a8fc555ac0b3be5.exe.exe windows:5 windows x86 arch:x86
7641afddf4654d16195180656b07d0a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesLengthA
InterlockedIncrement
ReadConsoleA
GetConsoleAliasA
InterlockedDecrement
GetCurrentProcess
GetComputerNameW
GetModuleHandleW
GetTickCount
GenerateConsoleCtrlEvent
FindNextVolumeMountPointA
ReadConsoleW
CreateRemoteThread
GetConsoleAliasExesW
CreateDirectoryExW
GlobalAlloc
GetVolumeInformationA
GlobalFindAtomA
LoadLibraryW
GetLocaleInfoW
ReadConsoleInputA
GetTimeFormatW
GetLocaleInfoA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
RemoveDirectoryA
SetStdHandle
SetComputerNameA
GetTempFileNameA
LoadLibraryA
InterlockedExchangeAdd
GetNumberFormatW
DeviceIoControl
GetConsoleTitleW
GetFileAttributesExW
AddConsoleAliasA
CloseHandle
CreateFileA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
GetModuleHandleA
FlushFileBuffers
RtlUnwind
HeapSize
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetAltTabInfoA
SetMenu
LoadKeyboardLayoutA
CharUpperBuffA
advapi32
InitiateSystemShutdownA
Sections
.text Size: 651KB - Virtual size: 651KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 22.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ