C:\seje\mohesuwun\lufodaziyuv27\tedugi cukij sosavudaku\bozuy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32.exe
Resource
win10v2004-20240709-en
General
-
Target
d8df96a70be6ca8efaccddcdf93adb72cf186788a4ef2c6a23389e6a38d7dac3
-
Size
161KB
-
MD5
e6ddfee4ca3278eef7ea43a9a4df6853
-
SHA1
d876908f95f5e85c22b5e89461aa7572cae836fd
-
SHA256
d8df96a70be6ca8efaccddcdf93adb72cf186788a4ef2c6a23389e6a38d7dac3
-
SHA512
0f1b91d677ff6908b12a9a72aa7d332d7702d65529fd128c6d78d7006e6b2b95a75d502887aaae64ae3d4a18e4ce0b33176f59a72b26fdbd199e5a392c66a3e6
-
SSDEEP
3072:z3m+Wi6Tu9rFlZvfRKcpC0ha6kL0AM0hk7xwzRnhEKhkxZS6K:z3m7iyu9RnpP7e0ADhk7xwzAF/u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32.exe
Files
-
d8df96a70be6ca8efaccddcdf93adb72cf186788a4ef2c6a23389e6a38d7dac3.zip
Password: infected
-
28766d53e02141d8332cdb160ebbc4bee6df26596d0c041e15aae650d6613d32.exe.exe windows:5 windows x86 arch:x86
e22fde80595c4bea0880fd6845018d6a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
CreateMutexW
SetLocaleInfoW
FindNextVolumeW
GetNamedPipeHandleStateA
LocalFileTimeToFileTime
EnumResourceTypesW
EnumResourceNamesW
FillConsoleOutputCharacterA
CreateTimerQueueTimer
TerminateProcess
SetEvent
FindNextFileW
GetCompressedFileSizeA
CopyFileExW
BuildCommDCBW
VerifyVersionInfoA
FreeResource
SetLastError
GetVersionExA
ReadConsoleOutputCharacterA
SetDefaultCommConfigW
VerLanguageNameW
GetCommConfig
WritePrivateProfileStructW
LocalFree
CreateTimerQueue
FindNextVolumeMountPointA
ResetWriteWatch
WriteConsoleInputA
LoadResource
AddAtomW
InitAtomTable
GetThreadPriority
CallNamedPipeW
GetDriveTypeW
BuildCommDCBAndTimeoutsA
VirtualProtect
GlobalAlloc
VerifyVersionInfoW
InterlockedExchange
FindFirstChangeNotificationW
SearchPathW
FormatMessageW
SetDllDirectoryW
GetModuleHandleA
WritePrivateProfileStringA
GetUserDefaultLCID
TerminateThread
GlobalUnfix
SetConsoleWindowInfo
InterlockedDecrement
GetStartupInfoA
GetSystemWow64DirectoryW
CopyFileA
GetPrivateProfileIntA
SetCalendarInfoW
DebugBreak
SetConsoleCursorInfo
FreeLibraryAndExitThread
GetModuleFileNameA
SetConsoleScreenBufferSize
WaitForDebugEvent
InterlockedExchangeAdd
GetOEMCP
GetPrivateProfileStringW
CreateActCtxA
GetPrivateProfileIntW
ReadConsoleInputW
OutputDebugStringW
SetThreadAffinityMask
FlushConsoleInputBuffer
lstrlenA
WriteConsoleW
OpenMutexW
GetThreadContext
DeleteCriticalSection
QueryDepthSList
ConvertFiberToThread
SetProcessPriorityBoost
LockFile
FreeEnvironmentStringsA
GetConsoleCP
CreateIoCompletionPort
AllocConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthA
CreateMailslotW
GetCommState
MoveFileWithProgressW
GetSystemTimeAdjustment
EnumSystemLocalesA
GetLastError
WriteProfileStringA
OpenMutexA
OpenWaitableTimerW
OpenFileMappingW
GetFileSizeEx
GetConsoleAliasesLengthW
SetProcessShutdownParameters
FillConsoleOutputCharacterW
WriteConsoleOutputCharacterA
GetNumberFormatA
BuildCommDCBAndTimeoutsW
GetConsoleAliasExesA
GetBinaryTypeW
GetModuleHandleW
Sleep
InterlockedIncrement
GetProcAddress
ExitProcess
MoveFileA
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
WriteFile
GetStdHandle
GetACP
GetCPInfo
IsValidCodePage
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
OutputDebugStringA
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
CharUpperW
Sections
.text Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�.6�u Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE