C:\pikor-gixu\vifukicu42\vizirevecakuve29.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4e90cbff460414a9bd5b8ba2c9680bca2f85d3a38b4d2b2242f8c176d102f72f.exe
Resource
win7-20240221-en
General
-
Target
69230b88fdebae6ed7cfee6e835bb659e9f197cd1ea7f047e9d951e98c5f9e01
-
Size
140KB
-
MD5
67bab0daa4624aa4d36bb348602abfef
-
SHA1
b00c7a1cb347b3007fb71557353c53228a072c42
-
SHA256
69230b88fdebae6ed7cfee6e835bb659e9f197cd1ea7f047e9d951e98c5f9e01
-
SHA512
dd9a2f3a3ba4b82c80b1ca51c57a1e62b6ed0b650a9c01649717a71a3c2c04384f94259d79b677fdd42f69d85582cd256689f730d5031a965ca938728502ffb0
-
SSDEEP
3072:0ojjiM+jppy9IXt3AAteW8XZZL9BDcwojdKN1h0NJ:0o7+jpp79AAmXLjg9J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/4e90cbff460414a9bd5b8ba2c9680bca2f85d3a38b4d2b2242f8c176d102f72f.exe
Files
-
69230b88fdebae6ed7cfee6e835bb659e9f197cd1ea7f047e9d951e98c5f9e01.zip
Password: infected
-
4e90cbff460414a9bd5b8ba2c9680bca2f85d3a38b4d2b2242f8c176d102f72f.exe.exe windows:5 windows x86 arch:x86
9644dc245efd171dc55da36927086aff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindResourceW
InterlockedIncrement
QueryDosDeviceA
InterlockedCompareExchange
SetComputerNameW
GetComputerNameW
CreateHardLinkA
GetTickCount
VirtualFree
GlobalFindAtomA
LoadLibraryW
SetCommConfig
GetLocaleInfoW
SetConsoleMode
WriteConsoleW
SetComputerNameExW
GetStartupInfoW
WriteConsoleOutputCharacterA
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
LocalAlloc
AddAtomA
FindFirstVolumeMountPointA
lstrcmpiW
GetModuleHandleA
FindFirstChangeNotificationA
IsDebuggerPresent
CancelTimerQueueTimer
GetCurrentProcessId
ResetWriteWatch
DeleteFileA
GetConsoleAliasesLengthW
GetLastError
SetThreadContext
GetModuleHandleW
Sleep
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
gdi32
GetCharABCWidthsFloatA
DeleteMetaFile
shell32
ShellAboutW
Sections
.text Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ