C:\Users\удача\Desktop\projects\Release\BigProject.pdb
Static task
static1
Behavioral task
behavioral1
Sample
544697a024abaea1b24eaa3d89869b2c8a4c1acf96d4e152f5632d338d054c9e.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
544697a024abaea1b24eaa3d89869b2c8a4c1acf96d4e152f5632d338d054c9e.exe
Resource
win10v2004-20240704-en
General
-
Target
a8de175826d6eff479d6f383514e6aac57c695831358a49b43baf2befc9d5b5f
-
Size
212KB
-
MD5
9e3fbc7a29d17df5afcacfeaa21200eb
-
SHA1
e9786f55c6169774fc605abc1e4a69473e949a4b
-
SHA256
a8de175826d6eff479d6f383514e6aac57c695831358a49b43baf2befc9d5b5f
-
SHA512
ae9aa6aaa2e66f92aa8ccbc4279cf559b15c3b66b83ee56eefc6b990a15f731ac1349e0ecadb5037a9c26b2b149bdf5ee11c4ee006b1d00f387a1f7017343235
-
SSDEEP
3072:V60npChVzrfpwNkM5rtAc65kpj3YM7FgDZ7r1oGDWaUsSObiXKOd0MyBTioqUJmp:V5EzTpwKM5rehupjoAFI55O6R3M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/544697a024abaea1b24eaa3d89869b2c8a4c1acf96d4e152f5632d338d054c9e.exe
Files
-
a8de175826d6eff479d6f383514e6aac57c695831358a49b43baf2befc9d5b5f.zip
Password: infected
-
544697a024abaea1b24eaa3d89869b2c8a4c1acf96d4e152f5632d338d054c9e.exe.exe windows:6 windows x86 arch:x86
35504252928d496732012120d2a694cf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
GetCurrentProcess
CreateThread
VirtualAlloc
VirtualProtect
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryA
MultiByteToWideChar
CreateFileW
WideCharToMultiByte
GetStringTypeW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
TerminateProcess
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
CloseHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
HeapSize
WriteConsoleW
Sections
.text Size: 480KB - Virtual size: 479KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ