@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
0x000b000000023351-8.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0x000b000000023351-8.exe
Resource
win10v2004-20240426-en
Target
ipepdrdT.pif_pw_infected.zip
Size
36KB
MD5
48bda39bb7cec87cd6bfa5de51a3dacf
SHA1
ed03486573787d4ec257f5c19980e62327ba65b2
SHA256
88156228129c59f8414afff0666c5dc6634bf0f2f4cb206fbe2cc1b3bf64a009
SHA512
48dd2beca8280b241cbdf4cbe8686f55fe42f689a86c17686e066ced6d3861939b383fbf4deca97ba657b61383c5f00d507131c3f3596307fd3b04e466ab04e2
SSDEEP
768:y3lPDvoKcSJGPI/To9dRDOtRGIDizpWyM8J5IVtQBwWA96WGKKIYz8q:YlLQKxJZ72WuIDpQ5IGwWAkWjq
Checks for missing Authenticode signature.
Processes:
resource |
---|
unpack001/0x000b000000023351-8 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
RegCloseKey
RegOpenKeyA
RegQueryValueA
CloseHandle
CreateDirectoryA
CreateFileA
CreateProcessA
DeleteFileA
DeleteFileW
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetACP
GetCPInfo
GetCommandLineA
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStrings
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetTimeZoneInformation
GetVersion
GetVersionExA
GlobalMemoryStatus
InitializeCriticalSection
LeaveCriticalSection
LocalAlloc
LocalFree
MoveFileA
MultiByteToWideChar
OpenProcess
OpenSemaphoreA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SleepEx
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcatA
lstrlenA
CharLowerBuffA
EnumThreadWindows
MessageBoxA
wsprintfA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ