C:\vos\zebexu\4-voraxopi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f1a83ca51de663f90eddcee2480847538f36d6151306d4c31f9d5e8baf709a9b.exe
Resource
win7-20240220-en
General
-
Target
a61890d03d848f06e9364dee2cdea23d4c909161b1c992a66357741bf5a5ce15
-
Size
189KB
-
MD5
f2110ee8a37fed7e7e3994545d64e6f9
-
SHA1
d53907f3d0a0933648c8913fc3c5e52a7d563351
-
SHA256
a61890d03d848f06e9364dee2cdea23d4c909161b1c992a66357741bf5a5ce15
-
SHA512
fcf255ea6f2794d193de6634e117b273a1618bb5c2c286e279f58a24c7617023c63395d949b071755b42dc9c9444600b356294092f2e594863d67b187fe13370
-
SSDEEP
3072:C+ZEbWTLDpXqmTTgmsx3ft1nL+xvqJojSY5C7Z6+I7bsomwfurAuC:DyWbEmTitkoJojV5fhbotr0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f1a83ca51de663f90eddcee2480847538f36d6151306d4c31f9d5e8baf709a9b.exe
Files
-
a61890d03d848f06e9364dee2cdea23d4c909161b1c992a66357741bf5a5ce15.zip
Password: infected
-
f1a83ca51de663f90eddcee2480847538f36d6151306d4c31f9d5e8baf709a9b.exe.exe windows:5 windows x86 arch:x86
06c8e00a743867b86720b098532e17b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLocaleInfoA
GetConsoleAliasExesLengthA
FindResourceW
InterlockedIncrement
InterlockedDecrement
GetTickCount
GetNumberFormatA
ReadConsoleW
EnumTimeFormatsW
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
GetLocaleInfoW
ReadConsoleInputA
FindNextVolumeMountPointW
CreateDirectoryA
OpenMutexW
GetLastError
GetProcAddress
AttachConsole
VirtualAlloc
GetConsoleAliasesLengthW
LoadLibraryA
WriteConsoleA
GetExitCodeThread
SetEnvironmentVariableA
GetModuleFileNameA
GetCurrentDirectoryA
GetFileAttributesExW
DuplicateHandle
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
AddConsoleAliasA
GetVolumeInformationW
RemoveDirectoryA
CreateFileA
GetStringTypeW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RaiseException
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
SetFilePointer
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
CloseHandle
LCMapStringA
LCMapStringW
GetStringTypeA
user32
GetAltTabInfoW
CharLowerBuffA
GetClassInfoA
LoadKeyboardLayoutW
CharUpperBuffW
gdi32
StretchDIBits
shell32
FindExecutableA
Sections
.text Size: 198KB - Virtual size: 198KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 22.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ