C:\zoco\gehedosex\petitohize_vobewut80-nof_soro_ziyicigu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3312724c28199331edc8a84cfaa73b14.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3312724c28199331edc8a84cfaa73b14.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
3312724c28199331edc8a84cfaa73b14.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
3312724c28199331edc8a84cfaa73b14.exe
Resource
win11-20240319-en
General
-
Target
3312724c28199331edc8a84cfaa73b14.exe
-
Size
272KB
-
MD5
3312724c28199331edc8a84cfaa73b14
-
SHA1
1bdb3b2511d29eeb2ec73e55831bedbbd1c17ac0
-
SHA256
6c710e14a61dda7a7f944d1cd364dc160c3427596c803d9bdea1f41ea692db84
-
SHA512
43aaef135f4e39f01e04acda013fb376368b0a86b6ef0d630650f4723385e25d29c5122cbdbf113ea31a69e75f7a0bcb2fe52c0c1dc3eac36e6f1380b3c26479
-
SSDEEP
3072:hQSZOGrxk76Upla2BWD2bWVfhuRFVdQDtC52KWuF1KDsBTgn:hQSZRx86ilHBWaWVfhuJdQZFPuPUsBT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3312724c28199331edc8a84cfaa73b14.exe
Files
-
3312724c28199331edc8a84cfaa73b14.exe.exe windows:5 windows x86 arch:x86
c1b6c9e0caeca603c5b8bff3561933c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
GlobalDeleteAtom
EnumCalendarInfoA
GetConsoleAliasesLengthW
GlobalAddAtomA
InterlockedIncrement
GetCurrentProcess
InterlockedCompareExchange
GetComputerNameW
OpenSemaphoreA
GetModuleHandleW
GetProcessHeap
GetVolumePathNameW
GlobalAlloc
LoadLibraryW
Sleep
AssignProcessToJobObject
SizeofResource
GetSystemWindowsDirectoryA
EnumResourceLanguagesA
FlushFileBuffers
LCMapStringA
InterlockedExchange
GetComputerNameA
GetLastError
SetLastError
BackupRead
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
EnumDateFormatsExA
SetComputerNameA
LoadLibraryA
CreateFileMappingA
FindFirstVolumeMountPointW
FindAtomA
GlobalFindAtomW
CreateIoCompletionPort
FindFirstChangeNotificationA
VirtualProtect
SetCalendarInfoA
GetVersionExA
OpenFileMappingA
TlsFree
OpenMutexW
GetFullPathNameW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
HeapFree
TerminateProcess
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapAlloc
HeapReAlloc
RtlUnwind
gdi32
GetDeviceGammaRamp
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ