C:\tifefemoji13\zujicalo\wuyoducef61\falarafa\cadoxuveha26\hihalo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fe7525bd0374eded2a65bb894a599973d6dce62f3149b4de01d57608349c1e11.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe7525bd0374eded2a65bb894a599973d6dce62f3149b4de01d57608349c1e11.exe
Resource
win10v2004-20240709-en
General
-
Target
0c0305bb59b27e4406051b56e0a466a0.bin
-
Size
265KB
-
MD5
5757b46a505128bb23027f056989fba3
-
SHA1
e478b75da79bef3ca080642eb9ccf8f1ab9dbd34
-
SHA256
8121b2eac09ac6c6fe5a58d46a4b0cdbe8d451a958e3188ccf3aa5893f540c4f
-
SHA512
29051b899bae1dcb176375fce336aa8a2569bb0d4d4dbdef68de288190821e46e04921454cbc776dfd29c795ff0259b0b67943a5fe518c2fc7e60ab701a346dc
-
SSDEEP
6144:57n7QCbSB6Upu/mXCBHciltIrxgo56TVbIFlO0IsKP:5L7QCbSAsuOuciltYgoMCAXP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/fe7525bd0374eded2a65bb894a599973d6dce62f3149b4de01d57608349c1e11.exe
Files
-
0c0305bb59b27e4406051b56e0a466a0.bin.zip
Password: infected
-
fe7525bd0374eded2a65bb894a599973d6dce62f3149b4de01d57608349c1e11.exe.exe windows:5 windows x86 arch:x86
Password: infected
0aa6e337c2cfd6bc7063b3211897b34e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
CreateMutexW
SetLocaleInfoW
FindNextVolumeW
GetNamedPipeHandleStateA
LocalFileTimeToFileTime
EnumResourceTypesW
EnumResourceNamesA
FillConsoleOutputCharacterA
CreateTimerQueueTimer
TerminateProcess
SetLastError
SetEvent
FindNextFileW
GetCompressedFileSizeA
CopyFileExW
BuildCommDCBA
VerifyVersionInfoW
FreeResource
GetVersionExA
ReadConsoleOutputCharacterA
SetDefaultCommConfigW
VerLanguageNameW
GetCommConfig
WritePrivateProfileStructA
LocalFree
DeleteTimerQueueTimer
FindNextVolumeMountPointA
GetWriteWatch
WriteConsoleInputW
LoadResource
AddAtomW
GlobalDeleteAtom
GetThreadPriority
CallNamedPipeW
GetDriveTypeW
BuildCommDCBAndTimeoutsA
VirtualProtect
GlobalAlloc
GetVersionExW
GlobalFix
FindFirstChangeNotificationW
VerifyVersionInfoA
SearchPathW
FormatMessageW
SetDllDirectoryW
GetModuleHandleW
WritePrivateProfileStringA
GetUserDefaultLCID
TerminateThread
GlobalUnfix
SetConsoleWindowInfo
InterlockedDecrement
GetStartupInfoA
GetSystemWow64DirectoryW
CopyFileA
GetPrivateProfileIntA
SetCalendarInfoW
DebugBreak
SetConsoleCursorInfo
FreeLibraryAndExitThread
GetModuleFileNameA
SetConsoleScreenBufferSize
WaitForDebugEvent
InterlockedExchangeAdd
GetOEMCP
GetPrivateProfileStringW
CreateActCtxW
ReadConsoleInputW
OutputDebugStringW
PulseEvent
SetThreadAffinityMask
FlushConsoleInputBuffer
lstrlenA
LoadLibraryW
WriteConsoleW
GetThreadContext
FreeEnvironmentStringsA
TryEnterCriticalSection
QueryDepthSList
ConvertFiberToThread
SetProcessPriorityBoost
LockFile
FreeEnvironmentStringsW
GetConsoleCP
CreateIoCompletionPort
AllocConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthA
CreateMailslotW
GetCommState
MoveFileWithProgressA
GetPrivateProfileIntW
GetSystemTimeAdjustment
EnumSystemLocalesW
OpenMutexA
GetLastError
WriteProfileStringA
OpenWaitableTimerW
OpenFileMappingW
GetConsoleAliasesLengthW
SetProcessShutdownParameters
FillConsoleOutputCharacterW
WriteConsoleOutputCharacterW
GetConsoleAliasExesA
GetDateFormatW
Sleep
InterlockedIncrement
GetProcAddress
ExitProcess
MoveFileA
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
WriteFile
GetStdHandle
GetACP
GetCPInfo
IsValidCodePage
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
OutputDebugStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
CharUpperW
Sections
.text Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 173KB - Virtual size: 336KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
:�h�u[ Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE