c:\eha\ywars\oowg\ieoviq\ofauetgjoe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cd19f707b40cfca05f200d72d34280c5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd19f707b40cfca05f200d72d34280c5.exe
Resource
win10v2004-20240226-en
General
-
Target
cd19f707b40cfca05f200d72d34280c5
-
Size
588KB
-
MD5
cd19f707b40cfca05f200d72d34280c5
-
SHA1
1664ffd372ea8e57c0aead02166ac2e917f64ed3
-
SHA256
6d35831389422169d668cac8ca82b920f9e24832f13386caabb4e3ea3e97882a
-
SHA512
0fa1caf2c4713c12e2456b4cef81a3e44996e4722abf5014431e4d6ff8624c424fa84d66ffc3f1cae47cb6c134a2586f5809084d67dbcd404943124c9fae0418
-
SSDEEP
12288:j4ysRONfHPgQLTHVkCJJi1tSgp+r82uzttFkzMoq:MyCONfHICHJJi18gpX26qz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd19f707b40cfca05f200d72d34280c5
Files
-
cd19f707b40cfca05f200d72d34280c5.exe windows:4 windows x86 arch:x86
d45bc8f123ca71d187e885c05f9e91ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
CreateUrlCacheGroup
gdi32
GetCharWidth32W
CreatePalette
EnumMetaFile
SwapBuffers
GetEnhMetaFileA
user32
CallWindowProcA
ModifyMenuA
DefFrameProcA
UnpackDDElParam
DdeNameService
CallNextHookEx
DlgDirListComboBoxA
RegisterClassExA
SetDlgItemTextW
GetGuiResources
SendNotifyMessageW
UnhookWinEvent
DdeGetData
GetWindowContextHelpId
ChildWindowFromPointEx
DdeDisconnectList
RealChildWindowFromPoint
RegisterClassA
GetWindowPlacement
CharUpperA
AnyPopup
OffsetRect
DdeKeepStringHandle
SetMenuContextHelpId
EnableMenuItem
CloseWindowStation
GetInputDesktop
LoadMenuIndirectW
EnumPropsW
SetWindowsHookExW
SetUserObjectInformationA
CopyRect
BeginDeferWindowPos
SetMenuItemBitmaps
GetUserObjectInformationA
GetKeyboardState
DdeUnaccessData
SetMenuInfo
FindWindowW
CountClipboardFormats
LookupIconIdFromDirectoryEx
DdeCreateDataHandle
GetKBCodePage
EndDialog
GetMenuItemInfoA
OpenDesktopA
TabbedTextOutA
GrayStringA
SetDlgItemTextA
DialogBoxIndirectParamW
ExitWindowsEx
GetMenuItemRect
DlgDirListA
BringWindowToTop
ValidateRgn
RedrawWindow
SetSystemCursor
kernel32
GetCurrentProcess
LCMapStringA
GetTickCount
GetStartupInfoA
SetHandleCount
HeapFree
ReadFile
GetStringTypeW
GetCurrentThread
WriteFile
IsBadWritePtr
InitializeCriticalSection
GetConsoleCursorInfo
GetLocalTime
GetVersion
GetModuleFileNameA
GetCPInfo
GetProcAddress
EnterCriticalSection
GetFileType
WideCharToMultiByte
GetCurrentThreadId
GetSystemTimeAsFileTime
GetVersionExA
WriteProfileStringW
WritePrivateProfileStringA
HeapReAlloc
SetFilePointer
GetTimeZoneInformation
HeapDestroy
TlsFree
GetConsoleTitleA
GetCommandLineA
TlsAlloc
GetCurrentProcessId
WaitNamedPipeA
lstrlen
CompareStringA
MultiByteToWideChar
HeapCreate
HeapAlloc
LCMapStringW
InterlockedIncrement
CreateMutexA
FlushFileBuffers
VirtualQuery
DeleteCriticalSection
SetComputerNameA
VirtualFree
CloseHandle
VirtualAlloc
UnhandledExceptionFilter
GetLastError
GetACP
GetOEMCP
SetLastError
InterlockedExchange
OpenMutexA
CompareStringW
GetStringTypeA
GetEnvironmentStringsW
LocalAlloc
ContinueDebugEvent
GetSystemTime
GetEnvironmentStrings
CreateFileA
TlsGetValue
LeaveCriticalSection
SetTimeZoneInformation
SetStdHandle
ExitProcess
SetFileAttributesA
LoadLibraryA
TlsSetValue
TransmitCommChar
QueryPerformanceCounter
RtlUnwind
LocalUnlock
GetStdHandle
FreeEnvironmentStringsW
TerminateProcess
SetEnvironmentVariableA
InterlockedDecrement
GetUserDefaultLCID
GetModuleHandleA
FreeEnvironmentStringsA
comdlg32
GetFileTitleA
LoadAlterBitmap
ReplaceTextW
ReplaceTextA
comctl32
InitCommonControlsEx
ImageList_Write
CreatePropertySheetPageA
MakeDragList
ImageList_BeginDrag
GetEffectiveClientRect
ImageList_DragMove
CreateMappedBitmap
ImageList_Draw
ImageList_LoadImageA
ImageList_DragShowNolock
CreateStatusWindowW
ImageList_DragLeave
ImageList_DrawEx
DrawStatusTextW
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 316KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ