C:\Users\Zdravstvuy\Desktop\windows\Release\e.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3656c44fd59366700f9182278faf2b6b94f0827f62a8aac14f64b987141bb69b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3656c44fd59366700f9182278faf2b6b94f0827f62a8aac14f64b987141bb69b.exe
Resource
win10v2004-20240226-en
General
-
Target
3656c44fd59366700f9182278faf2b6b94f0827f62a8aac14f64b987141bb69b.zip
-
Size
24KB
-
MD5
1c3735c05c024eda661e97e4662d0fb3
-
SHA1
9fcfcd1d217f1da1229c94dc1c42de8760067e5b
-
SHA256
91e018cbb37d99d6b535033e52ac15568555079bf69a8a2b578f624bf560868a
-
SHA512
aa1a472dc27115f476d51630e5252129297e9c0c97ad2546ddb06ae204878869ab3ae127e5491ae841767b52faad8d4c7a10b1441b55c6beb03be958dd31417d
-
SSDEEP
384:v4DG0oVuFRfKnlR6BNynj1UD5p85y2yHnCdYGCzSZQLgIp8Wtqqlphzw3fWKrXe4:yRilR6BN75Yy7CZQsIeWtvlHCXr4E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3656c44fd59366700f9182278faf2b6b94f0827f62a8aac14f64b987141bb69b
Files
-
3656c44fd59366700f9182278faf2b6b94f0827f62a8aac14f64b987141bb69b.zip.zip
Password: infected
-
3656c44fd59366700f9182278faf2b6b94f0827f62a8aac14f64b987141bb69b.exe windows:6 windows x86 arch:x86
aa53da15507eb3657f5ff476f3f320d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenProcess
GetTickCount
GetModuleHandleA
GetProcAddress
LoadLibraryA
lstrcmpW
lstrlenW
SetVolumeMountPointW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateFileW
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
lstrlenA
GetCommandLineW
FindClose
FindFirstFileW
FindNextFileW
GetFileSizeEx
GetLogicalDrives
GetCurrentProcess
SetFileAttributesW
SetFilePointerEx
WaitForSingleObject
CreateMutexA
WaitForMultipleObjects
GetCurrentProcessId
ExitProcess
CreateThread
ExitThread
SetProcessShutdownParameters
GetSystemInfo
lstrcmpiW
lstrcpyW
lstrcatW
OpenMutexA
MoveFileExW
WideCharToMultiByte
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
CreateSemaphoreA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
Sleep
GetLastError
CloseHandle
GetVolumePathNamesForVolumeNameW
GetDriveTypeW
FindVolumeClose
FindNextVolumeW
ReadFile
FindFirstVolumeW
IsProcessorFeaturePresent
user32
wsprintfA
advapi32
CryptGenRandom
QueryServiceStatusEx
OpenServiceA
OpenSCManagerA
EnumDependentServicesA
ControlService
CloseServiceHandle
CryptAcquireContextW
CryptReleaseContext
shell32
SHEmptyRecycleBinA
CommandLineToArgvW
ShellExecuteW
netapi32
NetShareEnum
NetApiBufferFree
rstrtmgr
RmGetList
RmRegisterResources
RmEndSession
RmStartSession
mpr
WNetOpenEnumW
WNetCloseEnum
WNetEnumResourceW
WNetGetConnectionW
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ