C:\fofenicukib6-yovini1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476.exe
Resource
win10v2004-20240709-en
General
-
Target
dbdc2f5b2f7b338a4673cb4b5b207d72.bin
-
Size
162KB
-
MD5
983582de94ea083f43948676bfe9b783
-
SHA1
bc1d29e1899f73d8ed2772a970e75f0d6c721815
-
SHA256
cdc5752aa11d41d823c524fdc0fdb017402e2bdf1cbfd8794f723c71556f33cd
-
SHA512
19556eb454f6c7a3f64f062b434f6f9b994c4ef49cb829359b672e14a006c4864c373306b2e7a3ae566a1fde5b5dca46be10ebc8a7e7a63536b7b889feef64eb
-
SSDEEP
3072:euTk/VcIW98ejl8iHeiNZEiQuLrEBMcYg52PZQrAlpS8zAbL1RshVR3tt9W:fINgKi+iNIIrEBTISIU8EbLEhbP4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476.exe
Files
-
dbdc2f5b2f7b338a4673cb4b5b207d72.bin.zip
Password: infected
-
d74ebe06d17fc8e347dda04ca17006fa2f24deb7df06617feb13bffdc9bee476.exe.exe windows:5 windows x86 arch:x86
Password: infected
e22fde80595c4bea0880fd6845018d6a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
CreateMutexW
SetLocaleInfoW
FindNextVolumeW
GetNamedPipeHandleStateA
LocalFileTimeToFileTime
EnumResourceTypesW
EnumResourceNamesW
FillConsoleOutputCharacterA
CreateTimerQueueTimer
TerminateProcess
SetEvent
FindNextFileW
GetCompressedFileSizeA
CopyFileExW
BuildCommDCBW
VerifyVersionInfoA
FreeResource
SetLastError
GetVersionExA
ReadConsoleOutputCharacterA
SetDefaultCommConfigW
VerLanguageNameW
GetCommConfig
WritePrivateProfileStructW
LocalFree
CreateTimerQueue
FindNextVolumeMountPointA
ResetWriteWatch
WriteConsoleInputA
LoadResource
AddAtomW
InitAtomTable
GetThreadPriority
CallNamedPipeW
GetDriveTypeW
BuildCommDCBAndTimeoutsA
VirtualProtect
GlobalAlloc
VerifyVersionInfoW
InterlockedExchange
FindFirstChangeNotificationW
SearchPathW
FormatMessageW
SetDllDirectoryW
GetModuleHandleA
WritePrivateProfileStringA
GetUserDefaultLCID
TerminateThread
GlobalUnfix
SetConsoleWindowInfo
InterlockedDecrement
GetStartupInfoA
GetSystemWow64DirectoryW
CopyFileA
GetPrivateProfileIntA
SetCalendarInfoW
DebugBreak
SetConsoleCursorInfo
FreeLibraryAndExitThread
GetModuleFileNameA
SetConsoleScreenBufferSize
WaitForDebugEvent
InterlockedExchangeAdd
GetOEMCP
GetPrivateProfileStringW
CreateActCtxA
GetPrivateProfileIntW
ReadConsoleInputW
OutputDebugStringW
SetThreadAffinityMask
FlushConsoleInputBuffer
lstrlenA
WriteConsoleW
OpenMutexW
GetThreadContext
DeleteCriticalSection
QueryDepthSList
ConvertFiberToThread
SetProcessPriorityBoost
LockFile
FreeEnvironmentStringsA
GetConsoleCP
CreateIoCompletionPort
AllocConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthA
CreateMailslotW
GetCommState
MoveFileWithProgressW
GetSystemTimeAdjustment
EnumSystemLocalesA
GetLastError
WriteProfileStringA
OpenMutexA
OpenWaitableTimerW
OpenFileMappingW
GetFileSizeEx
GetConsoleAliasesLengthW
SetProcessShutdownParameters
FillConsoleOutputCharacterW
WriteConsoleOutputCharacterA
GetNumberFormatA
BuildCommDCBAndTimeoutsW
GetConsoleAliasExesA
GetBinaryTypeW
GetModuleHandleW
Sleep
InterlockedIncrement
GetProcAddress
ExitProcess
MoveFileA
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
WriteFile
GetStdHandle
GetACP
GetCPInfo
IsValidCodePage
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
OutputDebugStringA
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
CharUpperW
Sections
.text Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 234KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
��7�u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE