I:\wfMxQofkv\fzjHzogfjrwyme\harmdaLo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bd3c904d798936ae0904e02f3239cb3b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd3c904d798936ae0904e02f3239cb3b.exe
Resource
win10v2004-20231215-en
General
-
Target
bd3c904d798936ae0904e02f3239cb3b
-
Size
191KB
-
MD5
bd3c904d798936ae0904e02f3239cb3b
-
SHA1
d5578435ec19cbf339ad389865cb35e4f0952802
-
SHA256
d85722144f270858afb40286cbaa04f362cf185b07003b45e9a9facc3f204e7a
-
SHA512
2d6fbed6c79b3d66f04826c956fcb00e4754d759cd8272f4f1cbe02e3b5d6a18a7e368e05405c994c046e17d235e4efca8699da5f7251429dcc1591e5962e8da
-
SSDEEP
3072:aT3DZ5m6JKJ7RzIn2TptN5tNxeM09gsI/g7+P8CuPhN77Y8FhrC54Il:aX/dJoRz02ltBNx9hvM+P8XpJY0hrKj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd3c904d798936ae0904e02f3239cb3b
Files
-
bd3c904d798936ae0904e02f3239cb3b.exe windows:5 windows x86 arch:x86
3b68688f547c3ec2c6b0fbc4d925144f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ole32
GetConvertStg
kernel32
GetComputerNameA
GetModuleFileNameA
SetHandleCount
FindClose
FreeLibrary
GetDateFormatA
AreFileApisANSI
VirtualProtect
GlobalFindAtomA
lstrlenW
LoadLibraryA
Sleep
lstrcpynW
VerifyVersionInfoW
FlushFileBuffers
QueryDosDeviceW
GetUserDefaultLangID
GetStdHandle
FindFirstFileW
gdi32
CreateEllipticRgnIndirect
OffsetViewportOrgEx
GetSystemPaletteUse
StretchDIBits
SelectPalette
LineDDA
RectInRegion
GetPaletteEntries
GetCurrentObject
CreateSolidBrush
SetRectRgn
CreateDiscardableBitmap
GetTextExtentPoint32W
EndPath
TextOutW
CreateDIBitmap
SetBrushOrgEx
advapi32
GetSecurityDescriptorDacl
AddAccessDeniedAce
msvcrt
memcpy
version
VerQueryValueW
user32
OemToCharA
FindWindowW
GetAltTabInfoW
LoadCursorA
DeleteMenu
GetSubMenu
GetDialogBaseUnits
CharNextA
GetMenuCheckMarkDimensions
IsWindowUnicode
KillTimer
SendInput
PostMessageW
GetTopWindow
DestroyIcon
SwitchToThisWindow
SetSysColors
MessageBoxW
PostThreadMessageA
ShowCursor
GetDlgCtrlID
GetMessagePos
DispatchMessageA
GetSysColor
SetForegroundWindow
SetCursor
ClipCursor
GetCaretPos
EnumWindows
GetSysColorBrush
DestroyWindow
DrawTextExW
GetUpdateRect
TranslateAcceleratorW
GetMonitorInfoW
DestroyMenu
ModifyMenuW
comdlg32
ChooseFontW
FindTextW
GetSaveFileNameW
PageSetupDlgW
Exports
Exports
?SDOisioKJS@@YGKEPA_WG@Z
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dat_0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dat_2 Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_3 Size: 1024B - Virtual size: 549B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_4 Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 512B - Virtual size: 93B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ