C:\jaxinego\70\wetacegure27_jopizuva29\s.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0457b012cd995bb807ddba8cca13f5fca914cc05a4466725028dd184776d7b03.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0457b012cd995bb807ddba8cca13f5fca914cc05a4466725028dd184776d7b03.exe
Resource
win10v2004-20240226-en
General
-
Target
945e00ee877d6fd589c02c71e0786448bffd53ed2d473fee3ff3806551254a9e
-
Size
144KB
-
MD5
be819bac0f30f3cc8b7f268d9997f608
-
SHA1
61751b26855ac15d727d437c3b0f157e1a7a03d7
-
SHA256
945e00ee877d6fd589c02c71e0786448bffd53ed2d473fee3ff3806551254a9e
-
SHA512
d3a602fbb90476f9add5baff35b513458ad6d65ffb5ff491e14a49ed84309d992f641b47f5713f6a6647cfd88ee824f3d64778ae30c4bd0728b41425e5a85bde
-
SSDEEP
3072:jNZEyxGLmUL3+qv+LJet3YpYJVUGaVbVll9U2AU31skWaXuHx:jNKyxGSUL3mLJW4imG+9U2bWaXuR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0457b012cd995bb807ddba8cca13f5fca914cc05a4466725028dd184776d7b03.exe
Files
-
945e00ee877d6fd589c02c71e0786448bffd53ed2d473fee3ff3806551254a9e.zip
Password: infected
-
0457b012cd995bb807ddba8cca13f5fca914cc05a4466725028dd184776d7b03.exe.exe windows:5 windows x86 arch:x86
e01f936fab708abd530f704930642bbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLangID
FillConsoleOutputCharacterA
FindResourceA
GetConsoleAliasesLengthW
SetComputerNameExA
InterlockedDecrement
SetComputerNameW
CreateHardLinkA
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesLengthA
LoadLibraryW
ReadConsoleInputA
FreeConsole
GetStartupInfoW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
SetComputerNameA
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
MoveFileA
QueryDosDeviceW
FindNextChangeNotification
GlobalFindAtomW
PurgeComm
GetCurrentProcessId
DebugBreak
ReadConsoleOutputCharacterW
OpenFileMappingA
DeleteFileA
MultiByteToWideChar
Sleep
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapAlloc
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
CreateFileA
RaiseException
user32
GetWindowTextLengthA
GetKeyNameTextA
Sections
.text Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ