C:\nifazehikutuku65-badepa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
083CD293268C04593AED4AB2A89E31B7C694980AA32E6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
083CD293268C04593AED4AB2A89E31B7C694980AA32E6.exe
Resource
win10v2004-20240226-en
General
-
Target
083CD293268C04593AED4AB2A89E31B7C694980AA32E6.exe
-
Size
304KB
-
MD5
2610e965a06e11cddd08e637b2620da8
-
SHA1
a0e7b3c36964613e2060b4c07d6b581221c9502a
-
SHA256
083cd293268c04593aed4ab2a89e31b7c694980aa32e6dcfde239a4cfdc28afc
-
SHA512
c5ed28380eb12916d09b0d81a0d6ec877b5028cbdcb045ed7b8f8dd9e4890c26422883aa546ceb6b26a92c86148f07bb02a1795cbe37d7380386322c33c79b56
-
SSDEEP
3072:77+9mRLwmKaU2dQ1citrsV+FdgsH/4iyjjHTzJGvkTzX3VE51zdR6+B:v+sLI2dHUi+l4njjH5GeWzdRV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 083CD293268C04593AED4AB2A89E31B7C694980AA32E6.exe
Files
-
083CD293268C04593AED4AB2A89E31B7C694980AA32E6.exe.exe windows:5 windows x86 arch:x86
184895d232d8f733bc6c4bc24b3348f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetComputerNameExA
InterlockedDecrement
GetLogicalDriveStringsW
AddConsoleAliasW
GetComputerNameW
SetCommBreak
GetModuleHandleW
GetTickCount
FindNextVolumeMountPointA
TlsSetValue
AssignProcessToJobObject
WriteConsoleW
GetModuleFileNameW
CreateJobObjectA
InterlockedExchange
OpenMutexW
GetLastError
SetVolumeLabelA
VirtualAlloc
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
MoveFileA
GetNumberFormatW
RemoveDirectoryW
GlobalFindAtomW
EnumResourceTypesW
GetConsoleTitleW
VirtualProtect
GetFileAttributesExW
GetCurrentProcessId
UnregisterWaitEx
DeleteFileA
GetVolumeInformationW
GetProcAddress
GetSystemDefaultLangID
FlushFileBuffers
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetStartupInfoW
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
TlsGetValue
TlsAlloc
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
RaiseException
HeapAlloc
HeapReAlloc
HeapSize
RtlUnwind
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
CloseHandle
user32
GetMenu
gdi32
GetCharABCWidthsFloatW
winhttp
WinHttpSetOption
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ