d:\dev\pdev_static\apemap\extractorgui\Release\extractorgui.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e769e7c8f732a35173e76456562cace538b9ba16a6e38e1555eb1126cd753334.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e769e7c8f732a35173e76456562cace538b9ba16a6e38e1555eb1126cd753334.exe
Resource
win10v2004-20240508-en
General
-
Target
e769e7c8f732a35173e76456562cace538b9ba16a6e38e1555eb1126cd753334.zip
-
Size
29.0MB
-
MD5
92989e955f4f6b8175e523903f4e4712
-
SHA1
c589abbce1355bac84b0ce71287386379934a56d
-
SHA256
1bc64eb0cfbf818f9f3196041048eced5147f9ebebb326c351fb3592a180aea8
-
SHA512
d3526ae3f294d5dc511bd3fc816a4e45010e9d5769c2fb523b1a7cf598d443950234e42ff42eeff3ec5512937ecc70800f9376294025bb666a3dc6c8bef59ab4
-
SSDEEP
786432:udwtDpI1OG7GZQ9mRZVAvJTZ6B7UVJ9TEuZ/tl6283:udwtlcEmyAvdr7auZ/tl23
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e769e7c8f732a35173e76456562cace538b9ba16a6e38e1555eb1126cd753334.exe
Files
-
e769e7c8f732a35173e76456562cace538b9ba16a6e38e1555eb1126cd753334.zip.zip
Password: infected
-
e769e7c8f732a35173e76456562cace538b9ba16a6e38e1555eb1126cd753334.exe.exe windows:5 windows x86 arch:x86
d40b6d403182073cbf369325c5368a0b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
CreateProcessA
InterlockedExchange
GetTempFileNameA
GetTempPathA
LockResource
SizeofResource
LoadResource
FindResourceA
MultiByteToWideChar
GetCurrentThreadId
GetModuleHandleA
GetCurrentProcess
LocalFree
FormatMessageA
CloseHandle
GetFileAttributesA
GetCurrentDirectoryA
CreateFileA
FindClose
FindNextFileA
FindFirstFileA
CreateThread
ReadFile
SetFilePointer
SystemTimeToFileTime
GetFileType
MapViewOfFile
CreateFileMappingA
DuplicateHandle
WriteFile
UnmapViewOfFile
DosDateTimeToFileTime
CreateDirectoryA
SetFileTime
GetProcessHeap
SetEndOfFile
SetStdHandle
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
GetVolumeInformationA
GetLogicalDrives
GetDriveTypeA
GetModuleFileNameA
GetDiskFreeSpaceExA
CreateEventA
GetLastError
LoadLibraryA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
GetProcAddress
ExitProcess
RtlUnwind
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapFree
WriteConsoleW
GetStdHandle
GetModuleFileNameW
RemoveDirectoryA
DeleteFileA
HeapAlloc
LCMapStringA
LCMapStringW
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
InitializeCriticalSectionAndSpinCount
HeapSize
GetConsoleCP
GetConsoleMode
SetHandleCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
FlushFileBuffers
GetLocaleInfoA
GetStringTypeA
user32
GetWindowTextLengthA
DialogBoxParamA
SetWindowTextA
GetDlgItem
EnableWindow
SendMessageA
EndDialog
MessageBoxA
WaitForInputIdle
gdi32
GetObjectA
CreateFontIndirectA
CreateSolidBrush
DeleteObject
shell32
ShellExecuteA
SHFileOperationA
Sections
.text Size: 307KB - Virtual size: 306KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ