e:\ueyptovmcs\xojtikjwzp\edsiv
Static task
static1
Behavioral task
behavioral1
Sample
cdb78e5499b20770d760978965331b16.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cdb78e5499b20770d760978965331b16.exe
Resource
win10v2004-20240226-en
General
-
Target
cdb78e5499b20770d760978965331b16
-
Size
719KB
-
MD5
cdb78e5499b20770d760978965331b16
-
SHA1
861eefd1e6e1debcf3cb33cf52f2acc0b97a30f2
-
SHA256
f306d5990ffeefee50be144d26bec8cc778b9304fa8044072abb829ea03a0376
-
SHA512
4cda19faab03bc48fc86c89a88f741ab9343ebc11ecffe46662e071538aee0e08521e7fefe2d968b24847c09bad796ac1292ddb8174e90975e92c58fb08986ad
-
SSDEEP
12288:MpxIZOT5j/MzxKzGztYf8IDZ+yxuDO8u7knno0uJgwz5LdX:9ZOdMzxKiYEIdzOu4o1OSFdX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cdb78e5499b20770d760978965331b16
Files
-
cdb78e5499b20770d760978965331b16.exe windows:4 windows x86 arch:x86
78939d9a4cb267b5e9200655f5a0077b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
user32
RegisterWindowMessageA
RegisterClassExA
CharUpperA
RegisterClassA
MapVirtualKeyExW
GetWindowWord
CharToOemW
DrawFrame
DdeQueryStringW
DrawAnimatedRects
SwitchDesktop
IsChild
advapi32
RegQueryMultipleValuesA
LookupPrivilegeValueW
GetUserNameW
CryptVerifySignatureA
CryptGetUserKey
LogonUserA
CryptReleaseContext
LookupPrivilegeNameA
RegOpenKeyExW
CryptSetProviderExA
CryptGetDefaultProviderW
RegCreateKeyW
RegDeleteValueA
CryptDuplicateKey
CryptSetKeyParam
RegRestoreKeyW
RegQueryValueA
ReportEventW
RegNotifyChangeKeyValue
RegLoadKeyA
kernel32
CompareStringA
SetConsoleCP
GetStartupInfoW
VirtualQuery
GetConsoleOutputCP
LeaveCriticalSection
GetConsoleMode
QueryPerformanceCounter
GetModuleHandleA
IsValidCodePage
WriteFileEx
GetUserDefaultLCID
WideCharToMultiByte
IsValidLocale
ExitProcess
TlsAlloc
GetCommandLineW
GetStdHandle
OpenMutexA
GetCurrentThreadId
LoadLibraryW
UnhandledExceptionFilter
TlsSetValue
InterlockedIncrement
TlsFree
GetDateFormatA
TlsGetValue
SetFilePointer
SetLastError
CreateMutexA
FlushFileBuffers
GetSystemInfo
HeapFree
GetLocaleInfoA
OutputDebugStringA
GetModuleFileNameA
IsBadReadPtr
CopyFileExA
GetCurrentProcess
GetFileAttributesA
lstrcmpiW
OpenSemaphoreW
InitializeCriticalSection
GetCurrentThread
RtlZeroMemory
ReadFile
GetACP
CreateWaitableTimerW
lstrlenA
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
HeapReAlloc
GetConsoleCP
HeapDestroy
EnterCriticalSection
SetStdHandle
GetVersionExA
RtlUnwind
FreeEnvironmentStringsW
GetEnvironmentStrings
GetModuleFileNameW
HeapAlloc
ExpandEnvironmentStringsW
GetCurrentProcessId
FreeLibrary
lstrcpynA
GetProcessHeap
GetUserDefaultLangID
MultiByteToWideChar
IsDebuggerPresent
SuspendThread
GetTimeZoneInformation
LCMapStringA
lstrcmpW
WriteFile
LoadLibraryA
OutputDebugStringW
GetStringTypeW
SetConsoleCtrlHandler
InterlockedExchange
EnumSystemLocalesA
LCMapStringW
GetStringTypeA
WriteConsoleW
GetTickCount
GetProcAddress
GetLastError
CreateFileA
WriteConsoleA
CloseHandle
GetLocaleInfoW
TerminateProcess
DeleteCriticalSection
GetFileType
RaiseException
GetCPInfo
HeapValidate
GetStartupInfoA
GetTimeFormatA
FreeEnvironmentStringsA
InterlockedDecrement
GetOEMCP
GetThreadPriorityBoost
CompareStringW
VirtualFree
FindFirstFileA
HeapCreate
ReadConsoleOutputCharacterA
DebugBreak
SetEnvironmentVariableA
GetCommandLineA
GetEnvironmentStringsW
VirtualAlloc
SetHandleCount
Sections
.text Size: 495KB - Virtual size: 494KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ