D:\UNztNt8Pz05\823GMDErQ\Uix77p2Nm8\LWAaj0Wj\JMSc1Fd\uk3eU\DRCTmTBq\tKpkUMEmXeMyA\48dY\zi9Wc3Cpt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
63061a372c41f5797f18dfeed166ec350e4029c46ad3c42ff79b8e284eb65ad6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63061a372c41f5797f18dfeed166ec350e4029c46ad3c42ff79b8e284eb65ad6.exe
Resource
win10v2004-20240226-en
General
-
Target
63061a372c41f5797f18dfeed166ec350e4029c46ad3c42ff79b8e284eb65ad6
-
Size
1.0MB
-
MD5
d3d9ad65fb3fb6f1eae29527b61ae7c0
-
SHA1
cdaaa01b42d3b4a325c11fdd7779ade9044e9946
-
SHA256
63061a372c41f5797f18dfeed166ec350e4029c46ad3c42ff79b8e284eb65ad6
-
SHA512
171b12d4e345e67a4bfa43e2be66b5e18ccd61d2dee0f7b520c995595d62c258f1a4a865c8b8cdf6a9aa0c7b467eb10989b3ddc5291f4196e95276b94ba1cb7c
-
SSDEEP
24576:nZeCB1cqVAtVi+0ZMdbIudTkvk7WCuwJLMBhRCLlX:n8UTMdkGBuHKX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63061a372c41f5797f18dfeed166ec350e4029c46ad3c42ff79b8e284eb65ad6
Files
-
63061a372c41f5797f18dfeed166ec350e4029c46ad3c42ff79b8e284eb65ad6.exe windows:6 windows x86 arch:x86
1470cd4bb57e8335a20f85a288a13b8b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetOEMCP
GetCommandLineW
GetCurrentProcess
GetThreadErrorMode
GetSystemDefaultUILanguage
GetUserDefaultLangID
GetThreadLocale
GetUserDefaultUILanguage
FlushProcessWriteBuffers
GetLargePageMinimum
GetCurrentThreadId
UnregisterApplicationRecoveryCallback
IsSystemResumeAutomatic
GetSystemDefaultLangID
GetACP
GetCommandLineA
GetTickCount64
GetLastError
GetThreadUILanguage
GetCurrentThread
TlsAlloc
SwitchToThread
GetCurrentProcessorNumber
GetErrorMode
UnregisterApplicationRestart
SetFileApisToOEM
GetTickCount
GetEnvironmentStringsW
GetLogicalDrives
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
WideCharToMultiByte
IsDebuggerPresent
AreFileApisANSI
MultiByteToWideChar
GetCPInfo
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
RaiseException
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
DecodePointer
user32
CreateMenu
GetProcessWindowStation
SetProcessDPIAware
GetMessageExtraInfo
GetFocus
GetClipboardViewer
GetOpenClipboardWindow
GetCursor
GetShellWindow
GetActiveWindow
AnyPopup
InSendMessage
GetCapture
GetMenuCheckMarkDimensions
CloseClipboard
EmptyClipboard
CountClipboardFormats
GetKBCodePage
IsProcessDPIAware
GetForegroundWindow
GetDialogBaseUnits
GetMessageTime
IsWow64Message
DestroyCaret
GetClipboardSequenceNumber
GetDesktopWindow
gdi32
GdiFlush
shell32
InitNetworkAddressControl
ole32
CoUninitialize
CoFreeUnusedLibraries
OleUninitialize
Sections
.text Size: 742KB - Virtual size: 742KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ