C:\woneka\nayohoyac\doyilak\g.pdb
Static task
static1
Behavioral task
behavioral1
Sample
74d8ea75eaa0b08203bd607fc7b03b96ea3c45f5fda7d883d8587db4b85c1bed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74d8ea75eaa0b08203bd607fc7b03b96ea3c45f5fda7d883d8587db4b85c1bed.exe
Resource
win10v2004-20240412-en
General
-
Target
5ca926323ee94836ddb1b595c5361e9f731ddf584921d0689df0e1c573104585
-
Size
166KB
-
MD5
cc22b638c0c86a75a188d527f106b7d7
-
SHA1
74783181a98087dd93e5c2dfa21505267e328908
-
SHA256
5ca926323ee94836ddb1b595c5361e9f731ddf584921d0689df0e1c573104585
-
SHA512
cf88a06900bf95060893f2a647f5df1f1d3f0adf2fd2b2f42869f8aefe1a6c2cceb145f22614ba4df08adb82cfed5cf1f0f98689913415e90c183f4ad6a866b8
-
SSDEEP
3072:crKrp7mvwQ6Vjq8f8s927tyN66aYdpRaaoIabEaTw1IKE6HeM6lkR8xfNl1:2CKzsq8fn92I66LUapIKJ+9A8v7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/74d8ea75eaa0b08203bd607fc7b03b96ea3c45f5fda7d883d8587db4b85c1bed.exe
Files
-
5ca926323ee94836ddb1b595c5361e9f731ddf584921d0689df0e1c573104585.zip
Password: infected
-
74d8ea75eaa0b08203bd607fc7b03b96ea3c45f5fda7d883d8587db4b85c1bed.exe.exe windows:5 windows x86 arch:x86
73f64d5610703b4f05e5f8dfa1eaa537
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesLengthA
LoadResource
GlobalAddAtomA
EndUpdateResourceW
GetCurrentProcess
CreateJobObjectW
InterlockedCompareExchange
SignalObjectAndWait
SetComputerNameW
GetComputerNameW
GetModuleHandleW
GetTickCount
GetDateFormatA
EnumTimeFormatsW
TzSpecificLocalTimeToSystemTime
GlobalAlloc
SetFileShortNameW
GlobalFindAtomA
FormatMessageW
GetVersionExW
SetConsoleCursorPosition
CreateFileW
GetVolumePathNameA
LCMapStringA
GetConsoleAliasesW
OpenMutexW
GetLastError
SetLastError
TlsGetValue
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
EnumDateFormatsExA
HeapUnlock
SetComputerNameA
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingA
DeleteTimerQueue
CreateFileMappingW
FindFirstVolumeMountPointW
SetThreadIdealProcessor
FoldStringW
FindFirstVolumeMountPointA
GetModuleHandleA
FindFirstChangeNotificationA
VirtualProtect
CompareStringA
GetCurrentThreadId
OpenSemaphoreW
TerminateJobObject
GetWindowsDirectoryW
lstrcpyA
GetNativeSystemInfo
BackupRead
GetFullPathNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
HeapAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
DdeQueryStringA
SetMessageExtraInfo
CharUpperW
gdi32
CreateCompatibleBitmap
SetDeviceGammaRamp
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 38.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 135KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ