C:\larew\31-wosuf\wecademovij-vadojepulunogo98 gu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
02f9c72d0b1cc241e46cd2b65e8ec63a233dead29e44c739a5bb3860a654d457.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
02f9c72d0b1cc241e46cd2b65e8ec63a233dead29e44c739a5bb3860a654d457.exe
Resource
win10v2004-20240709-en
General
-
Target
02f9c72d0b1cc241e46cd2b65e8ec63a233dead29e44c739a5bb3860a654d457.exe
-
Size
797KB
-
MD5
135fa780592dbc9a794897d3afa33617
-
SHA1
94f87dd8f65d376048cdf87e3ea5b392acdbe4b7
-
SHA256
02f9c72d0b1cc241e46cd2b65e8ec63a233dead29e44c739a5bb3860a654d457
-
SHA512
584b283c51846a122457b03cf981e0241a41cb1da7c86f56fa83ae81483a7415efd7c40434fc310358448860bdf991cc1a7839e64431f957be42d0ee29d0daf2
-
SSDEEP
12288:z+gg5In1ab4il+xSp+sqKXOo7RqBeUdvWz67OrkRxqkJ2R6Te5HoZ6x:qgg5e1q4il+xA+sn+TB7WRkJ2pdoZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 02f9c72d0b1cc241e46cd2b65e8ec63a233dead29e44c739a5bb3860a654d457.exe
Files
-
02f9c72d0b1cc241e46cd2b65e8ec63a233dead29e44c739a5bb3860a654d457.exe.exe windows:5 windows x86 arch:x86
1c4d1309fbe1ab2e3ba471bcd2b90944
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapFree
AddConsoleAliasW
LocalFlags
GetProcessHeap
ReadConsoleW
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
WideCharToMultiByte
LoadLibraryW
FreeConsole
SetVolumeMountPointA
GetVersionExW
WriteConsoleW
lstrlenW
ReplaceFileA
ReadConsoleA
GetStdHandle
SetLastError
VirtualAlloc
GetAtomNameA
LoadLibraryA
SetConsoleCtrlHandler
GetModuleFileNameA
FindFirstChangeNotificationA
FreeEnvironmentStringsW
GetConsoleTitleW
VirtualProtect
GetCPInfoExA
SetCalendarInfoA
ReleaseActCtx
GetDefaultCommConfigW
CloseHandle
CreateFileA
GetConsoleOutputCP
WriteConsoleA
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetLastError
WriteFile
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
user32
ChildWindowFromPoint
ole32
CoRevokeMallocSpy
winhttp
WinHttpCloseHandle
msimg32
AlphaBlend
Sections
.text Size: 738KB - Virtual size: 738KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
� �ģu Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE