C:\QTssLrfgwlissRqHKXak\numJercVapZfiriEuXk\dcLYerkchshhDL\yprbyctWgqgl\QkkYZtKXgunZqtJm\hiWlugozjoljmldVky\RyYfbxwekbbib\oienQTdkKfkuRfi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c79520353157f214bd723aa4499aa8ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c79520353157f214bd723aa4499aa8ad.exe
Resource
win10v2004-20240226-en
General
-
Target
c79520353157f214bd723aa4499aa8ad
-
Size
112KB
-
MD5
c79520353157f214bd723aa4499aa8ad
-
SHA1
19fbe030616feb07f121548bffbcd7b87ee22860
-
SHA256
036a583470da8066b00f841a137c91c3f25e23348f5dd39e0f95590dd88faeaf
-
SHA512
7a543b1f5c82e86274b4a11589004054e0dd0b59c60bd08cb5d8cd2487a996e35154e3ef8278d96fd00c4bef177ae1b9d264877459c8837b400bb4c8adb136ef
-
SSDEEP
1536:aJ84cvQb1WItHKQ6h8BWp5aqbSloA36cLGLHVry+BLMa7TdIvYJLDziJjxan872/:amVQx/HDbo5aP9KcL0jqm+wVDzAWp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c79520353157f214bd723aa4499aa8ad
Files
-
c79520353157f214bd723aa4499aa8ad.exe windows:5 windows x86 arch:x86
50a02d4de9e26f090b5d4cf54b947bd6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetForegroundWindow
LookupIconIdFromDirectory
CreatePopupMenu
DestroyWindow
ScreenToClient
DialogBoxParamA
SetPropW
GetMessagePos
ClientToScreen
GetUserObjectInformationW
wsprintfA
EnumThreadWindows
IsCharUpperA
GetDlgCtrlID
SetMenu
BeginPaint
GetNextDlgGroupItem
SetDlgItemTextW
GetMessageTime
LockWindowUpdate
OemToCharA
GetDialogBaseUnits
SetWindowPos
CharUpperBuffA
RegisterWindowMessageW
wsprintfW
IsWindowEnabled
GetWindowRect
AttachThreadInput
BringWindowToTop
shlwapi
StrCmpW
UrlGetPartW
kernel32
SetSystemTimeAdjustment
GetComputerNameExW
GetCurrentDirectoryW
GetDateFormatA
GetStdHandle
GetCurrentProcessId
GlobalReAlloc
GetLocaleInfoA
lstrlenW
ReadFile
lstrcatA
GlobalGetAtomNameW
HeapCreate
WaitForSingleObjectEx
GetUserDefaultLangID
OpenFileMappingW
LCMapStringW
gdi32
EndPath
GetTextMetricsW
ResizePalette
OffsetRgn
SelectObject
DPtoLP
SetViewportOrgEx
IntersectClipRect
CreateDIBSection
PtVisible
StartDocW
SetPixel
GetDeviceCaps
ntdll
memset
Exports
Exports
?Z_VQENikouahacokm@@YGHJ@Z
?DAQe__QTW_@@YGPAKKI@Z
?CCTai_mwpBHKKN@@YGPAXPAI@Z
?N_DCt_fbnJWD_JIM@@YGKJK@Z
?s_wkviyw_aQ@@YGD_N@Z
?_r_imlu____GBTS@@YGPA_NPAGE@Z
?Ux_lcg_yrfxefZ_QHoy@@YGKHD@Z
?p_m_q__zxxsgguhONboho@@YGEID@Z
?DKZ_iroqW@@YGFF@Z
?D_jw__wyb__dvF_CJT_@@YGF_NG@Z
?_GWVCF_@@YGEE@Z
?KTPLhnz@@YGDKM@Z
?pv___kuhU@@YGGPAH@Z
?cf_h_ce_ygjzbmc_G_nziv@@YGJK@Z
?_LUZWS_klZEID_NHSEPO_G@@YGXPAJ@Z
?twM_SJ_YNRV@@YGIEG@Z
?c_kFv_lHXSQBmx@@YGXPAJ@Z
?ULe_tmZT_X@@YGPAIDPAK@Z
?IVE__WKFQXSVU@@YGPAKH@Z
?Y_VZ_Lrdeirrrra_@@YGDD@Z
?___c__prb@@YGPAXPAE_N@Z
?hdmjuk_pU_@@YGFPAE@Z
?__n___r_lAQNV@@YGPANPAMPAF@Z
?tk_gm_STBAZ_NKYM_R@@YG_NKPAJ@Z
?SG_Lv_g@@YG_NEPAG@Z
?F__nkayvc__tfuV_Nws@@YGPAJDD@Z
?_zvoW_YXIkpmmj__ev@@YGPAXMPA_N@Z
?i__zdmz_u__ihed@@YGIGH@Z
?_EDIHIKpfvzgP@@YGIFM@Z
?oQACFUAAWFIgua_@@YGEFJ@Z
?zgJqdwa_p_n___dlu_@@YGHPAGPA_N@Z
?Xa_iceuII@@YGPAJGE@Z
?yx_eulBL_Hb_vgju_B@@YGXPAJ@Z
?TXW_P_EB_HISYG__ayu_W@@YGPAGD@Z
?ph__mgrDAFIVMNC@@YGHMPAI@Z
?AB__CVAKJ@@YGFM@Z
?tr_zq_onihz_mjfp__znko@@YGPAK_NPAF@Z
?gkax_EB____@@YGPAXI@Z
?__Gytiz@@YGPAGG@Z
?JKVJCXTKW@@YGEE@Z
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.iat Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ