C:\Projects\Stuff.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0ca2971ffedf0704ac5a2b6584f462ce27bac60f17888557dc8cd414558b479e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ca2971ffedf0704ac5a2b6584f462ce27bac60f17888557dc8cd414558b479e.exe
Resource
win10v2004-20240704-en
General
-
Target
29BEA6E995E3157C.zip
-
Size
217KB
-
MD5
7cd2a749955212d6ffb7b7a9da78efad
-
SHA1
98e2cc153ff66d5deb17a1069a2a9923a7105f78
-
SHA256
b0071e4387655a5e5b7d04fb92a82c6f0dd5071a507b1b4b516c779a7e0989cd
-
SHA512
1536d47ec424765d315e596f0c4ff19faf4f0ef55bbed2db21e211055798a3184275943ae0ef8fd75a21052b74635ad7b0b8bb516f46def4b7a9f058686a0d65
-
SSDEEP
3072:zoffEI1RM6MH/gKPZuFsjTPNBqNmyU0MrybGv82Hq56604tN8gVBsGCV7FIuPrmt:UffL1RbkgKBuyWrhMrUio66ZNg5aog
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/0ca2971ffedf0704ac5a2b6584f462ce27bac60f17888557dc8cd414558b479e
Files
-
29BEA6E995E3157C.zip.zip
Password: infected
-
0ca2971ffedf0704ac5a2b6584f462ce27bac60f17888557dc8cd414558b479e.exe windows:5 windows x86 arch:x86
b1348dc4952044b750f81e43f9b523c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
OutputDebugStringW
EnumSystemLocalesW
InterlockedDecrement
IsValidLocale
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
InterlockedIncrement
HeapSetInformation
VirtualAlloc
GetUserDefaultLCID
GetLocaleInfoW
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineW
RaiseException
RtlUnwind
GetLastError
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapSize
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetTickCount
GetModuleHandleW
CreateSemaphoreW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
GetCurrentThread
GetCurrentThreadId
HeapAlloc
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
HeapReAlloc
CloseHandle
user32
MonitorFromWindow
FillRect
DialogBoxParamW
GetClientRect
GetForegroundWindow
InvalidateRect
GetWindowLongW
GetWindowTextW
GetDlgItem
SetWindowLongW
EndDialog
GetSysColor
SendMessageW
SetWindowTextW
gdi32
GetDeviceCaps
SetDCBrushColor
GetStockObject
BitBlt
Sections
.text Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ