C:\mitupipulemu60_cijohore.pdb
Static task
static1
Behavioral task
behavioral1
Sample
df664e2606e455746882413141d9761a5ee972bf7d40a7ee0f5a5038a76ac835.exe
Resource
win7-20240221-en
General
-
Target
df664e2606e455746882413141d9761a5ee972bf7d40a7ee0f5a5038a76ac835
-
Size
249KB
-
MD5
2d9b73074da2b0dffbab8c9d0a6b524b
-
SHA1
cbf80d2e8653914f5b47dad9a4eaf84f713cd3d9
-
SHA256
df664e2606e455746882413141d9761a5ee972bf7d40a7ee0f5a5038a76ac835
-
SHA512
6a30d04a3e56ec53aa5b3378c37f7192c63102ae81192c378dedda38d88a0312371b8944873031da5e1486aae9432701cd3f9b858ac2323b69127a51a7af7e81
-
SSDEEP
3072:kTy3Zk0XNARlU/oDoK24RR25wZcCHrSUucoP8o4xGg3Upi4zvLJE5pOgep:pAgwDD3RR2ScCmqoP8rxGg3QzvVwO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df664e2606e455746882413141d9761a5ee972bf7d40a7ee0f5a5038a76ac835
Files
-
df664e2606e455746882413141d9761a5ee972bf7d40a7ee0f5a5038a76ac835.exe windows:5 windows x86 arch:x86
b019144a5c8fcfa6e09fc1ff7372262e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedDecrement
AddConsoleAliasW
GetComputerNameW
GetTickCount
FindNextVolumeMountPointA
GetNumberFormatA
GetConsoleTitleA
EnumTimeFormatsA
GlobalAlloc
ReadConsoleInputA
GetThreadSelectorEntry
GetConsoleAliasExesLengthW
GetVersionExW
WriteConsoleW
CreateDirectoryA
GetLastError
GetCurrentDirectoryW
SetLastError
ReadConsoleA
VirtualAlloc
LoadLibraryA
InterlockedExchangeAdd
SetCalendarInfoW
RemoveDirectoryW
GlobalFindAtomW
GetModuleFileNameA
GetFileAttributesExW
DuplicateHandle
GetWindowsDirectoryW
GetCurrentProcessId
GetVolumeInformationW
LCMapStringW
LCMapStringA
GetLocaleInfoA
FindResourceW
GetProcAddress
CreateFileA
GetStringTypeW
GetStringTypeA
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapFree
RaiseException
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleA
SetFilePointer
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
CloseHandle
user32
GetAltTabInfoA
UnregisterClassA
LoadKeyboardLayoutA
CharUpperBuffW
gdi32
StretchDIBits
advapi32
ReadEventLogA
shell32
FindExecutableW
ole32
StringFromIID
winhttp
WinHttpCheckPlatform
Sections
.text Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 22.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ