uiopferta.pdb
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.Win32.exe
Resource
win10v2004-20240226-en
General
-
Target
HEUR-Trojan.Win32.Generic-aafc3915d064451788775d8779d037641b76c47fb0fa4a29f4cce250b33f3235
-
Size
454KB
-
MD5
ebde6e0337f3239f806b8e6419722e87
-
SHA1
95b69b0c17652e7aed72c307e587e90c1dba243d
-
SHA256
aafc3915d064451788775d8779d037641b76c47fb0fa4a29f4cce250b33f3235
-
SHA512
60b5b1cef2bf0825e6cba4a24e2cd9cb6b5d9c35bdc0739879835aa65f8c7719f6ca4d2fed395ce5fccd6359e9e59986d6f64249a7f92b6bab7e35c77ca5815e
-
SSDEEP
6144:GY9C8QyNR9/ArE2O2LPhiZlgkm1EUHf01+3hWK4ECy83wscSstVZX8vgYldZ2XUE:GAf8g2O2LPi56EUHf0shru6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HEUR-Trojan.Win32.Generic-aafc3915d064451788775d8779d037641b76c47fb0fa4a29f4cce250b33f3235
Files
-
HEUR-Trojan.Win32.Generic-aafc3915d064451788775d8779d037641b76c47fb0fa4a29f4cce250b33f3235.exe windows:4 windows x86 arch:x86
222e7b320f36011feb1642000d8fa826
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
cryptdll
CDBuildVect
MD5Update
CDLocateRng
MD5Init
shell32
DragAcceptFiles
SHCreateShellItem
ShellAboutA
SHGetFileInfoA
StrChrA
SHFileOperationA
DragQueryFileA
FreeIconList
SHGetDataFromIDListA
SHGetDiskFreeSpaceA
FindExecutableA
SHGetDesktopFolder
ShellMessageBoxW
SHGetFolderPathA
SHGetMalloc
DragFinish
dbnmpntw
ConnectionClose
ConnectionWrite
ConnectionError
kernel32
FileTimeToSystemTime
SearchPathA
OpenMutexA
GetPrivateProfileIntW
GetModuleHandleW
GetLocalTime
ReadConsoleW
FindFirstFileA
GetEnvironmentVariableA
DeviceIoControl
SetEnvironmentVariableW
CompareStringW
GetStringTypeW
IsValidCodePage
lstrcmpiA
lstrcmpA
TlsGetValue
GetProcAddress
GetTickCount
WriteConsoleA
lstrcpynW
GetLastError
CreateDirectoryA
GetCurrentDirectoryW
SetErrorMode
SleepEx
InterlockedDecrement
GetFullPathNameW
GetPrivateProfileIntW
IsBadStringPtrA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ