D:\VRCISFPER\QNEBISE\OEJSEQRWD\WGTOX\MQVYHHAT.PDB
Static task
static1
Behavioral task
behavioral1
Sample
c4b52046eee449530a415f046c93a6a4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c4b52046eee449530a415f046c93a6a4.exe
Resource
win10v2004-20240226-en
General
-
Target
c4b52046eee449530a415f046c93a6a4
-
Size
498KB
-
MD5
c4b52046eee449530a415f046c93a6a4
-
SHA1
db848daf39e72bf589c4832780d1a25d7658a8d1
-
SHA256
8b947918b4cf29051a60800555b7b5e8b9bdb959cffcd96eacae0e671722a544
-
SHA512
213a46b03a23f4ae0a19f2863cb0f30583a09c06c10551ba127e448b189486e7f9cea500880abdb1ed582461cb7b951f8b3b296137cdc18244535a164cb28669
-
SSDEEP
12288:WwsnsCkIdxdxv334V/fvOIJ5HlwWZklsT6aIavMuYs:ps8IdxnvYV/fZlwj4Lv1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4b52046eee449530a415f046c93a6a4
Files
-
c4b52046eee449530a415f046c93a6a4.exe windows:4 windows x86 arch:x86
67c04a8e747c5ab6d1dbff7c756b558c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
SHBrowseForFolder
ShellHookProc
comdlg32
GetOpenFileNameW
GetOpenFileNameA
LoadAlterBitmap
GetFileTitleA
user32
OemToCharBuffA
MapDialogRect
UnhookWindowsHook
RegisterClassA
UnionRect
GetQueueStatus
CascadeWindows
DefDlgProcW
PostThreadMessageW
ChangeDisplaySettingsExW
InsertMenuItemA
DdeKeepStringHandle
RegisterClassExA
DdeAccessData
InflateRect
LoadMenuIndirectW
ScrollDC
BlockInput
WINNLSGetIMEHotkey
comctl32
InitCommonControlsEx
advapi32
CryptDestroyKey
RegRestoreKeyA
kernel32
IsValidLocale
VirtualQuery
ReadFile
GetStringTypeW
QueryPerformanceCounter
CompareStringA
VirtualFree
TlsAlloc
SetConsoleCP
DeleteCriticalSection
GetLocaleInfoW
TlsFree
SetStdHandle
GetTickCount
VirtualAlloc
OpenMutexA
GetCPInfo
CreateMutexA
HeapDestroy
LCMapStringA
GetFileType
GetUserDefaultLCID
WriteFile
GetTimeZoneInformation
GetDateFormatA
GetLastError
InitializeCriticalSection
GetVersionExA
GetSystemTimeAsFileTime
GetStdHandle
ResetEvent
FillConsoleOutputCharacterA
GetCommandLineA
RtlUnwind
TlsGetValue
TlsSetValue
TerminateProcess
MultiByteToWideChar
GetACP
IsValidCodePage
FlushFileBuffers
CreateDirectoryExA
GetSystemInfo
IsBadWritePtr
HeapCreate
GetProcAddress
SetLastError
GetModuleFileNameA
GetCurrentProcess
OpenFile
GetCurrentThreadId
HeapReAlloc
LeaveCriticalSection
GetLocaleInfoA
SetFilePointer
CompareStringW
CloseHandle
VirtualProtect
HeapSize
UnhandledExceptionFilter
GetStringTypeA
SetEnvironmentVariableA
GetModuleHandleA
WideCharToMultiByte
InterlockedExchange
GetCurrentThread
LCMapStringW
EnterCriticalSection
TryEnterCriticalSection
FileTimeToLocalFileTime
GetOEMCP
GetStartupInfoA
GetTimeFormatA
GetEnvironmentStrings
SetHandleCount
HeapFree
GetEnvironmentStringsW
HeapAlloc
LoadLibraryA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
ExitProcess
EnumSystemLocalesA
GetCurrentProcessId
FindFirstFileExW
Sections
.text Size: 342KB - Virtual size: 341KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ