*Qf69@+mESRA.RY7*+6XEF#NH.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1d778359ab155cb190b9f2a7086c3bcb4082aa195ff8f754dae2d665fd20aa05.exe
Resource
win7-20240221-en
General
-
Target
42ec022935f327b5fdcb0430349af3a5e369aeaa6e74a45525e841b7731c5490
-
Size
143KB
-
MD5
5c4dc17938a6c291585173747dc99034
-
SHA1
f2e1cca8eecfb880496942fc2d4e43f726b5046e
-
SHA256
42ec022935f327b5fdcb0430349af3a5e369aeaa6e74a45525e841b7731c5490
-
SHA512
ff41b9d8c6325c2877e5fba5eeb237b79b9419f865b50b786505e327b1ef2b134179c68b25ce5072067b153b7e68811d2ccd5582a42642545a059cd870a218f8
-
SSDEEP
3072:HPoyC64b0u/r2jtkpg0S5X8vNB1jhZxekL1G1tSNQsb3TGTP6a1tCj1:voyrKr2BkG0S5MljhjRG6NRb3TGTP6ac
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/1d778359ab155cb190b9f2a7086c3bcb4082aa195ff8f754dae2d665fd20aa05.exe
Files
-
42ec022935f327b5fdcb0430349af3a5e369aeaa6e74a45525e841b7731c5490.zip
Password: infected
-
1d778359ab155cb190b9f2a7086c3bcb4082aa195ff8f754dae2d665fd20aa05.exe.exe windows:5 windows x86 arch:x86
0f630aaf8b5c4e958445ec0c2d5ec47e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
secur32
EnumerateSecurityPackagesA
msvcrt
_controlfp
_except_handler3
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
kernel32
GetThreadLocale
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
FlushInstructionCache
EnumUILanguagesW
GetConsoleSelectionInfo
PrepareTape
gdi32
SetBitmapDimensionEx
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt1 Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 73KB
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ