h:\egt\ztof.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b3f22451c068e2c87d303b01410c1624.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3f22451c068e2c87d303b01410c1624.exe
Resource
win10v2004-20240226-en
General
-
Target
b3f22451c068e2c87d303b01410c1624
-
Size
685KB
-
MD5
b3f22451c068e2c87d303b01410c1624
-
SHA1
d5227ab0966c08721e3f55ba6f838367460c447f
-
SHA256
bc47c53fb61cdc054620d0fd7c58332020d9c25684729bf3ab260968a8ae6388
-
SHA512
251768bafc9fc8685bff215515e7b4569f869e024858ab737695116a09696af55833e0c78930207e90065f235be17893218332cacbd65ba431f35300481b779a
-
SSDEEP
12288:Pqsqr9Hd3qAvs1+MQ+RlrnWvh7uE/p85BuAiAfz4/46P+RJsnkoKB4D0LqxkY:Pqsg9ZJs/iu9q/4nJsnko6k0Gx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3f22451c068e2c87d303b01410c1624
Files
-
b3f22451c068e2c87d303b01410c1624.exe windows:4 windows x86 arch:x86
991b8a02bedfa2cd0856cbef1e531869
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
CreateToolbar
InitMUILanguage
ImageList_SetIconSize
DestroyPropertySheetPage
ImageList_GetDragImage
CreateStatusWindow
ImageList_GetImageInfo
ImageList_DragShowNolock
ImageList_SetImageCount
DrawStatusText
ImageList_Write
GetEffectiveClientRect
InitCommonControlsEx
ImageList_Create
CreatePropertySheetPageA
CreatePropertySheetPageW
ImageList_Draw
ImageList_Merge
DrawStatusTextA
ImageList_GetFlags
ImageList_Read
user32
DrawTextExA
SetProcessWindowStation
DestroyWindow
GetListBoxInfo
MenuItemFromPoint
AnyPopup
CopyAcceleratorTableA
OpenDesktopW
EnumPropsW
CreateDialogParamA
TileWindows
RegisterClassExA
ChangeMenuA
GetWindowRgn
CreateWindowExA
GetMenu
RegisterClassA
SetMenu
MessageBoxW
GetUserObjectInformationA
DefWindowProcW
CharUpperBuffW
SetWindowLongA
ShowWindow
kernel32
GetStartupInfoA
GetProcAddress
GetOEMCP
SetEnvironmentVariableA
HeapLock
HeapDestroy
CompareStringA
GetCommandLineA
GetModuleHandleA
TlsFree
GetCurrentThreadId
GetSystemTimeAsFileTime
LoadLibraryA
VirtualProtect
GetCPInfo
GetFileSize
GetStringTypeA
WriteFile
SetHandleCount
TlsGetValue
IsValidCodePage
InitializeCriticalSection
HeapSize
VirtualFree
GetUserDefaultLCID
OpenMutexA
ReadFile
SetStdHandle
ExitProcess
GetVersionExA
VirtualAllocEx
GetCurrentThread
TlsAlloc
HeapAlloc
GetACP
EnumSystemLocalesA
FreeEnvironmentStringsA
GetFileType
GetTimeFormatA
CloseHandle
GetDateFormatA
InterlockedExchange
HeapReAlloc
SetLastError
GetTickCount
GetEnvironmentStringsW
GetProfileIntW
GetStringTypeW
IsValidLocale
CreateMutexA
UnhandledExceptionFilter
EnterCriticalSection
VirtualAlloc
WideCharToMultiByte
SetFilePointer
IsBadWritePtr
DeleteCriticalSection
GetLastError
LeaveCriticalSection
CompareStringW
GetCurrentProcessId
GetLocaleInfoA
RtlUnwind
GetCurrentProcess
HeapFree
GetModuleFileNameA
FlushFileBuffers
QueryPerformanceCounter
WritePrivateProfileStructW
GetLocaleInfoW
MultiByteToWideChar
FreeEnvironmentStringsW
MoveFileExW
FindFirstFileExW
GetStdHandle
LCMapStringW
GetEnvironmentStrings
TerminateProcess
VirtualQuery
GetTimeZoneInformation
TlsSetValue
GetSystemInfo
LCMapStringA
HeapCreate
shell32
ShellExecuteExA
SHEmptyRecycleBinA
wininet
FtpPutFileA
FindFirstUrlCacheEntryExW
UrlZonesDetach
SetUrlCacheConfigInfoW
FtpDeleteFileW
Sections
.text Size: 249KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 249KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ