I:\sfvfzwAkZzZ\UsuevAoIpat\oyGybqC\woIlbTjia\ngPmFkvFmRr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d4ea843083a7d663080c99bc12ef96b8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4ea843083a7d663080c99bc12ef96b8.exe
Resource
win10v2004-20240226-en
General
-
Target
d4ea843083a7d663080c99bc12ef96b8
-
Size
214KB
-
MD5
d4ea843083a7d663080c99bc12ef96b8
-
SHA1
58df0bdd5e8aa7a872dcbcdb31d64d06aed5fdba
-
SHA256
f73efe7a46b1c3d6d587d146c7913e6a10adf67904273496a04553358a2193e3
-
SHA512
fca7c5de5ef6592cb4c04430ff5d5d29aecfaa4039003c9aa2f3c033e194372b94622925fb20141154e46919e10c9b9d496e41bbe2bbffd311d24e4a8c120d1b
-
SSDEEP
6144:8wwZ+m5x/HygNjo2tk0lIzsMHZo00FypCsO4:8wo95x/rtrk0lrIpYy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4ea843083a7d663080c99bc12ef96b8
Files
-
d4ea843083a7d663080c99bc12ef96b8.exe windows:5 windows x86 arch:x86
66f1ed72691ebadb4fba6ed8c88e7a59
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetFileTitleW
GetOpenFileNameA
CommDlgExtendedError
msvcrt
_controlfp
qsort
putc
__set_app_type
__p__fmode
__p__commode
isspace
_amsg_exit
_initterm
_acmdln
isalnum
calloc
strcpy
exit
fwrite
atoi
_ismbblead
_XcptFilter
sscanf
_exit
_cexit
__setusermatherr
__getmainargs
atol
comctl32
ImageList_Create
InitCommonControlsEx
ImageList_GetIcon
ImageList_AddMasked
CreatePropertySheetPageA
gdi32
EnumFontFamiliesW
GetTextExtentPointA
LineDDA
CreateSolidBrush
EndPath
SetDIBitsToDevice
GetClipBox
LineTo
CreateHatchBrush
SetStretchBltMode
TextOutW
GetTextExtentPoint32A
BeginPath
TranslateCharsetInfo
DeleteObject
GetDeviceCaps
kernel32
lstrcmpiA
FindNextChangeNotification
LocalReAlloc
ReadFile
WaitForMultipleObjects
lstrcatW
GetModuleHandleA
CreateFileA
SetHandleCount
GetCommandLineW
GetSystemTimeAdjustment
SetThreadLocale
SetFileAttributesA
LocalSize
CreateFileW
GetVersionExW
user32
AllowSetForegroundWindow
LoadAcceleratorsA
SetWindowLongW
OffsetRect
SetWindowPos
IsWindowEnabled
DrawTextW
ShowCursor
GetUserObjectInformationA
SetForegroundWindow
CharUpperBuffW
DefDlgProcW
GetClipCursor
AppendMenuW
ExitWindowsEx
GetWindowTextW
GetClassInfoExW
GetKeyboardLayoutNameW
DestroyWindow
CharNextExA
SystemParametersInfoW
DialogBoxIndirectParamA
CheckMenuItem
LoadImageW
InsertMenuA
SetDlgItemTextA
GetMenuItemInfoW
GetTopWindow
PostMessageA
GetWindowLongA
wsprintfW
GetDlgItemTextW
SetPropW
advapi32
LookupPrivilegeValueA
Exports
Exports
?InitializeCriticalSectionAndSpinCountHDhdhHGHdhds@@YGKEPA_WG@Z
Sections
.text Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.diag_y Size: 512B - Virtual size: 85B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.diag_x Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.div Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.plus Size: 512B - Virtual size: 468B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.minus Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ