C:\surajuxu xif62 seju.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2e47721a4fb2c1e36520d287b3251a9ea2b688de1f36541e8bc06c169c2b410a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e47721a4fb2c1e36520d287b3251a9ea2b688de1f36541e8bc06c169c2b410a.exe
Resource
win10v2004-20240709-en
General
-
Target
a459c876f20b2ab552a0945256624310.bin
-
Size
683KB
-
MD5
8c27a7dda5381e17aecf2c10249fa1ac
-
SHA1
c99d1c1992f26e42692e43bef2c841714d27da80
-
SHA256
fabedd0c14df78991097c1a3208e3ef984d4593b2978845b9b5d04905baa56f3
-
SHA512
5541e46f4836b2cbe3ccb7d7ef40c43d18a2f344f0f512498282ff54d472953410237f01a12236b6d4ee59f88bb647b64883fbc741b8d00e146ce25c8bca80d4
-
SSDEEP
12288:oGpcMaA4EO8Hec695Ms9KcUmhpUNNKBxs2pqAf+/x4I1fvCrF4obLS8J2uG:oick4EO8Hk7Ms9K5mhmNNKBxs2RW4I17
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2e47721a4fb2c1e36520d287b3251a9ea2b688de1f36541e8bc06c169c2b410a.exe
Files
-
a459c876f20b2ab552a0945256624310.bin.zip
Password: infected
-
2e47721a4fb2c1e36520d287b3251a9ea2b688de1f36541e8bc06c169c2b410a.exe.exe windows:5 windows x86 arch:x86
Password: infected
42499a002b9d8635fd26126765c4da68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLocaleInfoA
FindNextVolumeW
GetNamedPipeHandleStateW
FileTimeToSystemTime
EnumResourceTypesW
EnumResourceNamesW
FillConsoleOutputCharacterW
GetTimeZoneInformation
TerminateProcess
SetEvent
FindNextFileA
GetCompressedFileSizeA
CopyFileExW
BuildCommDCBW
VerifyVersionInfoW
FreeResource
SetLastError
GetVersionExW
ReadConsoleOutputCharacterA
SetDefaultCommConfigA
VerLanguageNameA
EscapeCommFunction
WritePrivateProfileStructW
FreeEnvironmentStringsA
CreateTimerQueue
FindNextVolumeMountPointW
GetWriteWatch
WriteConsoleInputA
SetComputerNameExA
AddAtomW
InitAtomTable
GetThreadPriority
CallNamedPipeA
GetDriveTypeW
BuildCommDCBAndTimeoutsW
VirtualProtect
LoadLibraryW
GlobalAlloc
InterlockedExchange
FindFirstChangeNotificationA
VerifyVersionInfoA
FormatMessageA
SetDllDirectoryW
GetModuleHandleA
WritePrivateProfileStringA
GetUserDefaultLCID
GlobalUnfix
GetStartupInfoW
GetSystemWow64DirectoryW
CopyFileA
GetLastError
DebugBreak
SetConsoleCursorInfo
SetCalendarInfoW
SetConsoleScreenBufferSize
ContinueDebugEvent
InterlockedExchangeAdd
GetACP
WriteProfileSectionA
CreateActCtxA
GetPrivateProfileIntW
ReadConsoleInputW
OutputDebugStringW
EnumResourceTypesA
lstrlenA
WriteConsoleW
ReadConsoleOutputW
OpenMutexW
GetThreadContext
DeleteCriticalSection
GlobalWire
FreeEnvironmentStringsW
ConvertFiberToThread
SetVolumeMountPointA
EnumCalendarInfoA
SetProcessPriorityBoost
LockFile
VerSetConditionMask
GetConsoleCP
GetProfileStringA
CreateIoCompletionPort
AllocConsole
GlobalGetAtomNameA
SetComputerNameA
GetConsoleAliasExesLengthW
WriteConsoleInputW
CreateMailslotW
GetCommState
MoveFileWithProgressW
GetSystemTimeAdjustment
_hread
_lopen
EnumSystemLocalesW
GetConsoleAliasExesLengthA
MoveFileA
ResetWriteWatch
EnumDateFormatsW
DeleteAtom
GetSystemWindowsDirectoryA
GetComputerNameA
FindFirstVolumeW
CancelDeviceWakeupRequest
AreFileApisANSI
OpenWaitableTimerA
OpenFileMappingA
GetFileSizeEx
GetConsoleAliasesLengthW
GetProcessShutdownParameters
FindNextVolumeMountPointA
WriteConsoleOutputCharacterA
GetNumberFormatA
GetConsoleAliasExesA
GetBinaryTypeW
GetCurrentActCtx
BuildCommDCBAndTimeoutsA
GetPrivateProfileStringW
LoadLibraryA
GetModuleHandleW
Sleep
InterlockedIncrement
InterlockedDecrement
GetProcAddress
ExitProcess
DeleteFileA
RaiseException
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleFileNameA
WriteFile
GetStdHandle
GetOEMCP
GetCPInfo
IsValidCodePage
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
OutputDebugStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
CharToOemBuffA
gdi32
GetCharWidth32A
Sections
.text Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 588KB - Virtual size: 752KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
���ѣu� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE