C:\mimiwo\lopifavipedila\kixero-21\b.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bfaf90cca8f8bea4b9eca53099bae235ccf335656649722f13c6cb2790b93735.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bfaf90cca8f8bea4b9eca53099bae235ccf335656649722f13c6cb2790b93735.exe
Resource
win10v2004-20240709-en
General
-
Target
1f0f91fe920f4a3ca9bbdc23070cb097.bin
-
Size
265KB
-
MD5
7f541c7832928ec5dc51f10b425c9d71
-
SHA1
6f366f815eab842e1881a1f712382a691aa05284
-
SHA256
5a45217e1bd3a7a9a3bb773cab1747d70dca9bbc7b1bcbf55e51d6e68993e75a
-
SHA512
d78d1a4bcd9bf4bf98f38c7a6dbeda58ee06dffcffb67059d6b45cc8cd6ee56984458dc3b75ca8c16fab6a71cbaf3a50c09814616860813c6e75f177d5826e18
-
SSDEEP
6144:c7cgRf6g90upfkboddFcu6Uxwco1IK3NkgLTUsmAZ5B:c7cgF6Lupfk0dXDZuD1x+gLTpmArB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/bfaf90cca8f8bea4b9eca53099bae235ccf335656649722f13c6cb2790b93735.exe
Files
-
1f0f91fe920f4a3ca9bbdc23070cb097.bin.zip
Password: infected
-
bfaf90cca8f8bea4b9eca53099bae235ccf335656649722f13c6cb2790b93735.exe.exe windows:5 windows x86 arch:x86
Password: infected
27d8a7471ee53dd07acef039b03728e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
CreateMutexW
SetLocaleInfoW
FindNextVolumeW
GetNamedPipeHandleStateA
LocalFileTimeToFileTime
EnumResourceTypesW
EnumResourceNamesW
FillConsoleOutputCharacterA
CreateTimerQueueTimer
TerminateProcess
SetEvent
FindNextFileA
GetCompressedFileSizeA
CopyFileExW
BuildCommDCBW
VerifyVersionInfoA
FreeResource
SetLastError
GetVersionExA
ReadConsoleOutputCharacterA
SetDefaultCommConfigW
VerLanguageNameW
GetCommConfig
WritePrivateProfileStructW
LocalFree
CreateTimerQueue
FindNextVolumeMountPointA
ResetWriteWatch
WriteConsoleInputA
LoadResource
AddAtomW
InitAtomTable
GetThreadPriority
CallNamedPipeA
GetDriveTypeW
BuildCommDCBAndTimeoutsA
VirtualProtect
GlobalAlloc
VerifyVersionInfoW
InterlockedExchange
FindFirstChangeNotificationW
SearchPathW
FormatMessageW
SetDllDirectoryW
GetModuleHandleA
WritePrivateProfileStringA
GetUserDefaultLCID
TerminateThread
GlobalUnfix
SetConsoleWindowInfo
InterlockedDecrement
GetStartupInfoA
GetSystemWow64DirectoryW
CopyFileA
GetPrivateProfileIntA
SetCalendarInfoW
DebugBreak
SetConsoleCursorInfo
FreeLibraryAndExitThread
GetModuleFileNameA
SetConsoleScreenBufferSize
WaitForDebugEvent
InterlockedExchangeAdd
GetOEMCP
GetPrivateProfileStringW
CreateActCtxA
GetPrivateProfileIntW
ReadConsoleInputW
OutputDebugStringW
SetThreadAffinityMask
FlushConsoleInputBuffer
lstrlenA
WriteConsoleW
OpenMutexW
GetThreadContext
DeleteCriticalSection
QueryDepthSList
ConvertFiberToThread
SetProcessPriorityBoost
LockFile
FreeEnvironmentStringsA
GetConsoleCP
CreateIoCompletionPort
AllocConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthA
CreateMailslotW
GetCommState
MoveFileWithProgressW
GetSystemTimeAdjustment
EnumSystemLocalesA
GetLastError
OpenWaitableTimerW
OpenFileMappingW
GetFileSizeEx
GetConsoleAliasesLengthW
SetProcessShutdownParameters
FillConsoleOutputCharacterW
WriteConsoleOutputCharacterA
GetNumberFormatA
BuildCommDCBAndTimeoutsW
GetConsoleAliasExesA
GetBinaryTypeW
GetModuleHandleW
Sleep
InterlockedIncrement
GetProcAddress
ExitProcess
MoveFileA
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
WriteFile
GetStdHandle
GetACP
GetCPInfo
IsValidCodePage
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
OutputDebugStringA
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
CharUpperW
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
��N�u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE