D:\Wordyottabyte\Basic\retireval\d.pdb
Static task
static1
Behavioral task
behavioral1
Sample
52b973c029f230ba1049d1438ff7a960exe_JC.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
52b973c029f230ba1049d1438ff7a960exe_JC.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
52b973c029f230ba1049d1438ff7a960exe_JC.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
52b973c029f230ba1049d1438ff7a960exe_JC.exe
Resource
win11-20240221-en
General
-
Target
230916-vxxdjsfa22_pw_infected.zip.zip
-
Size
212KB
-
MD5
5063226e561df8ac092e543ae72030fc
-
SHA1
2c02f6dcfe30a92c829e373c1cd24f106f6bb20e
-
SHA256
249bd41de9fc96914e98d104dd50d6e4a8184e6bba932ff394c1fe9d0c0f61dc
-
SHA512
04afa73d7d67456312dfccabc352af624c8242cf4030b18b3daf87429f96d082a0740db9eab519a307b013336a6adc444c142204b1098e67b2b41f7d3e5d547a
-
SSDEEP
6144:dnYHmMlUAWt4M48zyliwJA/oIfcm20BbTc:F5MlR3qWlik60m9Tc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/52b973c029f230ba1049d1438ff7a960exe_JC.exe
Files
-
230916-vxxdjsfa22_pw_infected.zip.zip.zip
Password: infected
-
230916-vxxdjsfa22_pw_infected.zip.zip
Password: infected
-
52b973c029f230ba1049d1438ff7a960exe_JC.exe.exe windows:5 windows x86 arch:x86
61bfc8ce3e6e77a9f89e6662e5905239
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetFilePointer
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
GetLocaleInfoA
WriteConsoleA
HeapSize
IsValidCodePage
GetOEMCP
GetACP
SizeofResource
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
CloseHandle
CreateToolhelp32Snapshot
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetLastError
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
OpenProcess
GetProcessTimes
HeapAlloc
LoadResource
GetCPInfo
GetEnvironmentVariableW
LeaveCriticalSection
DeleteCriticalSection
GetModuleFileNameA
GetStdHandle
WriteFile
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
HeapFree
RtlUnwind
RaiseException
GetStartupInfoA
GetModuleHandleW
Sleep
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
user32
LoadCursorA
DialogBoxParamA
EndDeferWindowPos
ModifyMenuA
UpdateWindow
BeginDeferWindowPos
LookupIconIdFromDirectory
SetTimer
GetWindowRect
InsertMenuItemA
GetMenuItemID
KillTimer
LoadIconA
GetClientRect
CreateMenu
SendMessageA
SetRectEmpty
GetDC
MessageBoxA
CreateWindowExA
DefWindowProcA
LoadAcceleratorsA
ShowWindow
SetMenu
CreatePopupMenu
FrameRect
AppendMenuA
GetMenuItemCount
DeferWindowPos
gdi32
SetTextColor
CreateHatchBrush
DeleteDC
SetBkColor
EnumObjects
CreateDCA
CreateBitmap
SetBkMode
DeleteObject
SelectObject
SelectClipRgn
Rectangle
GetStockObject
ExtEscape
shell32
SHBrowseForFolderA
ole32
OleDraw
psapi
QueryWorkingSet
InitializeProcessForWsWatch
EnumProcesses
GetWsChanges
avifil32
AVIFileInit
AVIFileOpenA
comctl32
ord6
ord17
opengl32
glLoadIdentity
glColor3f
glEnable
glLightfv
glVertex3f
glShadeModel
glBegin
glVertex2d
glEnd
glClear
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ