C:\kadava6.pdb
Static task
static1
Behavioral task
behavioral1
Sample
41c452f4ba12f523916ad3390d3711d9d6c05a7c698a83a890095a8c722249a5.exe
Resource
win7-20240221-en
General
-
Target
27e3226a21e936159389c741965661a891edcc6228836e1b8fe820baa630b5ef
-
Size
232KB
-
MD5
b6d6a00c0320382f76146671ff2a561d
-
SHA1
f4992908bf26360760a18c103de858a7bbe08305
-
SHA256
27e3226a21e936159389c741965661a891edcc6228836e1b8fe820baa630b5ef
-
SHA512
d8b39e5d9514963465313081b0f529795a999b67d520e950a0fb4a86b67c68144387926bb6e33d88b297a9b0b11820e471ec781c95bfc2ffb7459cd2d1bffa9c
-
SSDEEP
6144:8fWj0cFnt8EBhoqtik+anDqEHipyj3nibzXthX:8eQCBzikfDdHipyj3niXthX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/41c452f4ba12f523916ad3390d3711d9d6c05a7c698a83a890095a8c722249a5.exe
Files
-
27e3226a21e936159389c741965661a891edcc6228836e1b8fe820baa630b5ef.zip
Password: infected
-
41c452f4ba12f523916ad3390d3711d9d6c05a7c698a83a890095a8c722249a5.exe.exe windows:5 windows x86 arch:x86
99ab48e675287c5fa87def369efc076c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasesLengthW
FindResourceW
InterlockedIncrement
QueryDosDeviceA
InterlockedCompareExchange
FindCloseChangeNotification
GetComputerNameW
CreateHardLinkA
GetTickCount
GlobalFindAtomA
SetConsoleMode
WriteConsoleW
SetComputerNameExW
GetStartupInfoA
GetLastError
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
SetComputerNameA
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
AddAtomW
lstrcmpiW
GetModuleHandleA
PurgeComm
CompareStringA
DeleteFileW
GetCurrentProcessId
DebugBreak
ResetWriteWatch
ResumeThread
GetConsoleOutputCP
MultiByteToWideChar
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoW
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
HeapFree
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CloseHandle
CreateFileA
HeapAlloc
HeapReAlloc
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
SetFilePointer
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
user32
SetMessageExtraInfo
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ