userinit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
83ff727c8b2b6c627a3934972fd3564a8131dcec800c81d5abb05e96cac76ef7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83ff727c8b2b6c627a3934972fd3564a8131dcec800c81d5abb05e96cac76ef7.exe
Resource
win10v2004-20240412-en
General
-
Target
50547a28d392202f1abbfa416beaefe62839422848a1ba53979a2f557f0bdbcc
-
Size
12KB
-
MD5
1a57c4b445b00024c1bb185eb5a3e814
-
SHA1
6d59a75455b212cb8c30c231a908389a546e262c
-
SHA256
50547a28d392202f1abbfa416beaefe62839422848a1ba53979a2f557f0bdbcc
-
SHA512
5139329edf3d812d452f56e8bea05b6301cd2b1b2839ca03ce0bd7f18d8fecc52271362f2e0038cbf0b83c2621a85b1fdc4785721b18839e93d3fcdded5c604b
-
SSDEEP
384:lY+GlELmKYlXO3hUDueEUx4R5aghrWF8bR1FWUnJB:pg/lXMUDuWwpoFqJTnL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/83ff727c8b2b6c627a3934972fd3564a8131dcec800c81d5abb05e96cac76ef7
Files
-
50547a28d392202f1abbfa416beaefe62839422848a1ba53979a2f557f0bdbcc.zip
Password: infected
-
83ff727c8b2b6c627a3934972fd3564a8131dcec800c81d5abb05e96cac76ef7.exe windows:5 windows x86 arch:x86
c4e9a155c173d1b69beaa5ba7b2d1254
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
CreateWindowExW
DestroyWindow
RegisterClassExW
DefWindowProcW
LoadRemoteFonts
wsprintfW
GetSystemMetrics
GetKeyboardLayout
SystemParametersInfoW
GetDesktopWindow
LoadStringW
MessageBoxW
ExitWindowsEx
CharNextW
advapi32
RegOpenKeyExA
ReportEventW
RegisterEventSourceW
DeregisterEventSource
OpenProcessToken
RegCreateKeyExW
RegSetValueExW
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegQueryInfoKeyW
RegCloseKey
RegQueryValueExA
crypt32
CryptProtectData
winspool.drv
SpoolerInit
ntdll
RtlLengthSid
RtlCopySid
_itow
RtlFreeUnicodeString
DbgPrint
wcslen
wcscpy
wcscat
wcscmp
RtlInitUnicodeString
NtOpenKey
NtClose
_wcsicmp
memmove
NtQueryInformationToken
RtlConvertSidToUnicodeString
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
__setusermatherr
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
_initterm
_adjust_fdiv
kernel32
GetVersionExW
LocalFree
LocalAlloc
GetEnvironmentVariableW
SetEnvironmentVariableW
lstrlenW
lstrcpyW
FreeLibrary
GetProcAddress
LoadLibraryW
CompareFileTime
CloseHandle
lstrcatW
WaitForSingleObject
DelayLoadFailureHook
GetStartupInfoA
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
LoadLibraryA
InterlockedCompareExchange
LocalReAlloc
GetSystemTime
lstrcmpW
GetCurrentThread
SetThreadPriority
CreateThread
GetFileAttributesExW
GetSystemDirectoryW
SetCurrentDirectoryW
FormatMessageW
lstrcmpiW
GetCurrentProcess
GetUserDefaultLangID
GetCurrentProcessId
ExpandEnvironmentStringsW
SetEvent
OpenEventW
Sleep
GetLastError
SearchPathW
CreateProcessW
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
msxsbvr Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE