c:\omtnkdoj\bnwv\yogisfk\cqf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b1272de3f0fc0785efa4c692b4a1471c9b419dd93b7dcd4c9dc4fb6c09abc549.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b1272de3f0fc0785efa4c692b4a1471c9b419dd93b7dcd4c9dc4fb6c09abc549.exe
Resource
win10v2004-20240426-en
General
-
Target
b1272de3f0fc0785efa4c692b4a1471c9b419dd93b7dcd4c9dc4fb6c09abc549.exe
-
Size
421KB
-
MD5
9872fdbffbdb3145dc372df17ee4fdde
-
SHA1
595ddab28edeae1793481367e495e8db4c329446
-
SHA256
b1272de3f0fc0785efa4c692b4a1471c9b419dd93b7dcd4c9dc4fb6c09abc549
-
SHA512
7196f14794b7dc4bea9d4584bee8de9d1377bbd8e5b6ca52b4e22c99e39caf4d78c827bbc6755fc0fc4cf1a9d588568cbd2ae928056ca98a50854fd102239e30
-
SSDEEP
6144:OthIsXMGFfpDDswahLNUVQFGAC1ECZuonKelcTexLRE5oTBmArKUSY7h8qOmomlQ:OtesXM0fpDptrug7d25oU7Yh8qymleF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1272de3f0fc0785efa4c692b4a1471c9b419dd93b7dcd4c9dc4fb6c09abc549.exe
Files
-
b1272de3f0fc0785efa4c692b4a1471c9b419dd93b7dcd4c9dc4fb6c09abc549.exe.exe windows:5 windows x86 arch:x86
32a31bfad8ca2c4b8a1a523b9cceb9d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comdlg32
GetOpenFileNameA
GetSaveFileNameA
gdi32
BitBlt
DeleteDC
CreateCompatibleDC
GetStockObject
SetBkColor
SetTextColor
SelectObject
GetDeviceCaps
CreateCompatibleBitmap
CreateBitmap
TextOutA
DeleteObject
kernel32
RtlUnwind
SetStdHandle
WideCharToMultiByte
GetSystemTimeAsFileTime
WriteFile
GetModuleHandleW
LeaveCriticalSection
DeleteCriticalSection
GetConsoleCP
SetConsoleCtrlHandler
Sleep
GetCurrentThreadId
RaiseException
GetStdHandle
MultiByteToWideChar
TerminateProcess
GetStringTypeW
EnumSystemLocalesW
LoadLibraryExW
ReadFile
OutputDebugStringW
GetCPInfo
HeapFree
GetModuleFileNameW
FormatMessageA
GetCurrentProcess
GetLastError
FreeEnvironmentStringsW
AreFileApisANSI
HeapSize
SetUnhandledExceptionFilter
GetModuleFileNameA
GetConsoleMode
GetEnvironmentStringsW
FlushFileBuffers
IsValidCodePage
CreateSemaphoreW
IsProcessorFeaturePresent
GetACP
EnterCriticalSection
LCMapStringW
FreeLibrary
GetProcAddress
DecodePointer
GetFileType
EncodePointer
CreateFileW
GetProcessHeap
GetOEMCP
TlsFree
CloseHandle
GetStartupInfoW
SetFilePointerEx
HeapAlloc
QueryPerformanceCounter
IsValidLocale
GetModuleHandleExW
TlsGetValue
GetLocaleInfoW
TlsSetValue
IsDebuggerPresent
CompareStringW
InitializeCriticalSectionAndSpinCount
GetDateFormatW
CreateFileA
UnhandledExceptionFilter
LoadLibraryW
SetPriorityClass
InterlockedDecrement
WriteConsoleW
GetTimeFormatW
GetModuleHandleA
HeapReAlloc
SetLastError
GetCurrentProcessId
GetCurrentThread
GetUserDefaultLCID
ExitProcess
FatalAppExitA
InterlockedExchange
InterlockedIncrement
TlsAlloc
GetCurrentDirectoryA
shell32
ShellExecuteA
user32
GetMessageA
InvalidateRect
SetDlgItemTextA
PostQuitMessage
SetCursor
PeekMessageA
DestroyWindow
AdjustWindowRect
MessageBoxA
LoadImageA
GetSystemMenu
IsIconic
DefWindowProcA
LoadStringA
RegisterClassExA
SetForegroundWindow
CloseWindow
GetCursorPos
ReleaseDC
GetSystemMetrics
LoadIconA
CreateWindowExA
ShowCursor
SetWindowPos
GetCursor
SendMessageA
RemoveMenu
GetDlgItemTextA
EndDialog
DialogBoxParamA
GetDC
LoadCursorA
DispatchMessageA
TranslateMessage
WaitMessage
winmm
timeKillEvent
PlaySoundA
timeSetEvent
Sections
.text Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 357KB - Virtual size: 361KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ