C:\tuxeropuzez jorehe55.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d1a439295d063bc6f792782a10d8f8c1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d1a439295d063bc6f792782a10d8f8c1.exe
Resource
win10v2004-20240226-en
General
-
Target
d1a439295d063bc6f792782a10d8f8c1
-
Size
324KB
-
MD5
d1a439295d063bc6f792782a10d8f8c1
-
SHA1
16e0a70a9f133961b82db3bb49c8b5bc789b3205
-
SHA256
9b460178a8c3bd7321e69609f53c42e088e0aa91686d4bf09a595e2c3e09fef8
-
SHA512
f4266222e4c24dd98b8e66b261183636a15a900c659d87000bce88b3a29bc99e6f95588c241eb5d5289c72826fb8d932449347a441a9070e7d6f7400c3fe127e
-
SSDEEP
6144:h4frgjiuiwMoZh6In/ba90bD6BPAnpQx5AH:h40ji8MPg/ba9sD6BPAi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d1a439295d063bc6f792782a10d8f8c1
Files
-
d1a439295d063bc6f792782a10d8f8c1.exe windows:5 windows x86 arch:x86
7674305f35b9aa8841472231e8903dc3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasW
InterlockedPopEntrySList
GetConsoleDisplayMode
CreateConsoleScreenBuffer
GetConsoleCP
VerifyVersionInfoA
WriteConsoleA
SetLastError
CreateFileW
WritePrivateProfileSectionA
GetPrivateProfileSectionW
EnumDateFormatsExA
GetCurrentProcessId
LoadLibraryA
IsDebuggerPresent
SetConsoleCP
FindFirstVolumeW
WriteFile
BuildCommDCBW
VerLanguageNameA
AreFileApisANSI
WriteProcessMemory
SetEvent
GetExitCodeThread
EndUpdateResourceW
GetCPInfo
GetLastError
UpdateResourceA
SetConsoleTitleW
SetFilePointer
LoadLibraryExA
CopyFileW
ReadConsoleA
ActivateActCtx
AddRefActCtx
HeapLock
CreateActCtxW
ReadConsoleOutputA
GetProcessHeaps
GetSystemWindowsDirectoryW
GetUserDefaultLCID
BuildCommDCBAndTimeoutsA
HeapAlloc
UnmapViewOfFile
GetAtomNameA
HeapSize
GetGeoInfoW
GetCurrentProcess
VirtualProtect
GetProcAddress
GetModuleHandleA
CreateThread
GetVersionExW
SetProcessAffinityMask
WaitForSingleObject
SetConsoleCursorInfo
VerifyVersionInfoW
WriteConsoleOutputCharacterW
SetTimeZoneInformation
GetMailslotInfo
GetCPInfoExA
SetEnvironmentVariableA
GetFileAttributesExA
GetComputerNameW
CommConfigDialogW
GetConsoleAliasA
GetConsoleWindow
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
CreateFileA
GetConsoleAliasesLengthA
DnsHostnameToComputerNameA
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RtlUnwind
HeapReAlloc
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStdHandle
GetFileType
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetStdHandle
LCMapStringA
LCMapStringW
GetConsoleMode
FlushFileBuffers
CloseHandle
GetConsoleOutputCP
WriteConsoleW
user32
RealChildWindowFromPoint
GetAltTabInfoA
advapi32
AdjustTokenGroups
BackupEventLogA
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 4.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ