E:\Programação\C++\GDI\MALWARE\Purgatorium\Debug\Purgatorium.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Purgatorium.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Purgatorium.exe
Resource
win10v2004-20240709-en
General
-
Target
Purgatorium.exe
-
Size
504KB
-
MD5
0f0f9db4f0f83ea3cd9fdfca1e1137ab
-
SHA1
1382a14abe4159c8cd1b79bb884a5a6165c7a94c
-
SHA256
ed0b273da2354daeafa20e16e23920bca63368ec52e7ca956b450953c9173bf1
-
SHA512
edab0bd780c01a6b8b724388b8b882b6f4f934e68c7c51f2cd3fcc310ab33e05ae06d638b056633d26264f3fca893ab0961eaa1e051815883ebcdb54520aa1d8
-
SSDEEP
12288:kE5ftc2GheZyfKz1cWdGBu1nvWEI5Kr9:z5fbGjBuVGKr9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Purgatorium.exe
Files
-
Purgatorium.exe.exe windows:5 windows x86 arch:x86
81ca996850637413652c6c8e4c07807a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleCP
HeapReAlloc
HeapSize
SetConsoleCtrlHandler
GetStringTypeW
GetConsoleMode
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetFilePointerEx
FlushFileBuffers
GetVersionExW
CopyFileW
FindNextFileW
FindFirstFileW
DeleteFileW
GetFileAttributesW
SetFileAttributesW
CreateFileW
GetModuleFileNameW
lstrlenA
lstrcpyW
CloseHandle
FindClose
Sleep
WriteFile
TerminateThread
CreateThread
HeapDestroy
SetStdHandle
HeapCreate
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExW
FindFirstFileExA
WaitForSingleObjectEx
OutputDebugStringW
OutputDebugStringA
GetFileType
GetCurrentThreadId
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
GetProcAddress
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
GetStartupInfoW
GetModuleHandleW
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetACP
GetCurrentThread
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
CreateProcessW
GetFileAttributesExW
DecodePointer
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
WriteConsoleW
user32
SendMessageW
wsprintfW
DrawIcon
GetSystemMetrics
SendInput
GetDC
LoadIconW
FindWindowW
EnumChildWindows
GetWindowLongW
MessageBoxW
RedrawWindow
gdi32
TextOutA
CreateDIBSection
SetTextColor
SetStretchBltMode
StretchBlt
SetBkColor
SelectObject
PatBlt
Ellipse
DeleteObject
CreateSolidBrush
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
BitBlt
advapi32
RegOpenKeyExW
RegCreateKeyW
RegCloseKey
RegSetValueExW
shell32
ShellExecuteW
msimg32
AlphaBlend
winmm
waveOutOpen
waveOutPrepareHeader
waveOutUnprepareHeader
waveOutWrite
waveOutReset
waveOutSetVolume
Sections
.text Size: 321KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msvcjmc Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ