Static task
static1
Behavioral task
behavioral1
Sample
ptiza.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ptiza.exe
Resource
win10v2004-20240709-en
General
-
Target
ptiza.exe
-
Size
13KB
-
MD5
aa3096832de2b0c83c68cfde756ee8bd
-
SHA1
0413744c77689735c2eabbc43269c9c32da8f586
-
SHA256
7d6f891dcbcd7ff6125c31e5990e880eb1c290c04c1e094cd150e5795bef79bc
-
SHA512
ee19a9da8379b94518994b8895c33893112b1a50fcf9942114df76cecc9ad3a132cce218b58c82e6af77ed46654b16bd091580482f397cbbc09d44d2f5dcbc01
-
SSDEEP
192:w3/QAb2RxNvHzl/xFwdmEUX4jDxTuroxZjOy3Tsz4XJXRMxz7E5pz6HC:wPQg2LNvHlwdxDxirQjPYaJyz7DC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ptiza.exe
Files
-
ptiza.exe.exe windows:6 windows x86 arch:x86
ef872656045e618e31462c15eeccc15a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpSendRequestA
InternetConnectA
InternetCloseHandle
InternetOpenA
HttpOpenRequestA
user32
GetLastInputInfo
GetForegroundWindow
GetCursorPos
GetKeyState
iphlpapi
GetAdaptersInfo
kernel32
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetModuleHandleW
GetLogicalDrives
Process32First
FindFirstFileA
EnterCriticalSection
GetDriveTypeA
FindNextFileA
LeaveCriticalSection
InitializeCriticalSection
FindClose
WaitForSingleObject
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
Sleep
GetLastError
GetSystemDirectoryA
Process32Next
CloseHandle
K32GetModuleBaseNameA
GetSystemInfo
CreateThread
GetWindowsDirectoryA
K32EnumProcesses
GetProcAddress
DeleteCriticalSection
GlobalMemoryStatusEx
K32EnumProcessModules
GetTickCount
IsDebuggerPresent
UnhandledExceptionFilter
vcruntime140
strstr
_except_handler4_common
memset
__current_exception
__current_exception_context
memcpy
api-ms-win-crt-utility-l1-1-0
rand
srand
api-ms-win-crt-string-l1-1-0
strcat
strlen
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__stdio_common_vsprintf
__p__commode
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
free
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_seh_filter_exe
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
_crt_atexit
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
terminate
_cexit
_register_onexit_function
_initialize_onexit_table
_controlfp_s
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ