c:\ttbh\asosstxose\wmmhjzo\wehgdge\moomqjo\brkneter.PDB
Static task
static1
Behavioral task
behavioral1
Sample
a36007785202b6c2416f9ddec8a929f0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a36007785202b6c2416f9ddec8a929f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
a36007785202b6c2416f9ddec8a929f0N.exe
-
Size
536KB
-
MD5
a36007785202b6c2416f9ddec8a929f0
-
SHA1
49d3a980a462f0f568c92481ce6ada678ed6c2b5
-
SHA256
d0b7841920a6adf6d404059b60f17c6f15c80ba6e97c50ea255559ca2734b271
-
SHA512
49c56b969eb138e120b3bb98e7d4cb119b339d3b5a029e29657e81d9b65e29b1af839515f073ef232345a97121b5901ed92f4aa360b8d3adadf231f2d86cc98e
-
SSDEEP
12288:nSvPVKcLP8jsnygGVCCqfWOmDTVJc6RVDxgbncJA7:nzcQjKGQCqfWOmDR+mDOcJG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a36007785202b6c2416f9ddec8a929f0N.exe
Files
-
a36007785202b6c2416f9ddec8a929f0N.exe.exe windows:4 windows x86 arch:x86
7babee54c82dec00c7e1df59106e31e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
CryptSetProviderExW
LookupAccountSidA
RegLoadKeyA
LookupPrivilegeNameW
CryptExportKey
StartServiceA
CryptDuplicateHash
RegDeleteValueA
RegDeleteKeyW
RegOpenKeyExA
LookupSecurityDescriptorPartsW
GetUserNameA
CryptSetProviderW
kernel32
UnhandledExceptionFilter
GetProcAddress
LCMapStringA
ReadFile
HeapReAlloc
CompareStringW
Sleep
MultiByteToWideChar
GetModuleHandleA
GetModuleFileNameW
WideCharToMultiByte
GetModuleFileNameA
GetCurrentThreadId
VirtualFree
GetConsoleCP
WriteConsoleW
ExitProcess
GetTickCount
LoadLibraryA
CreateMutexA
TlsFree
GetCommandLineA
WriteFile
VirtualQuery
SetHandleCount
GetStdHandle
GetSystemTimeAsFileTime
HeapCreate
IsValidLocale
CloseHandle
GetConsoleMode
GetCurrentThread
GetACP
IsDebuggerPresent
HeapAlloc
TlsSetValue
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
SetLastError
FreeEnvironmentStringsW
GetLocaleInfoW
InterlockedExchange
GetTimeZoneInformation
TerminateProcess
GetLastError
VirtualAlloc
RtlUnwind
GetUserDefaultLCID
HeapSize
EnterCriticalSection
SetConsoleCtrlHandler
GetCurrentProcessId
GetCommandLineW
GetDateFormatA
WriteConsoleA
GetProfileIntA
CompareStringA
QueryPerformanceCounter
SetFilePointer
GetFileType
GetStartupInfoW
ResetEvent
LCMapStringW
LeaveCriticalSection
SetEnvironmentVariableA
EnumSystemLocalesA
FreeLibrary
CreateFileA
FindAtomA
HeapFree
GetCurrentProcess
GetStringTypeA
IsValidCodePage
GetModuleHandleW
GetConsoleOutputCP
GetTimeFormatA
GetLocaleInfoA
FlushFileBuffers
OpenMutexA
GetOEMCP
TlsGetValue
GetCPInfo
InterlockedIncrement
TlsAlloc
HeapDestroy
SetStdHandle
GetStartupInfoA
GetStringTypeW
DeleteCriticalSection
GetEnvironmentStringsW
comdlg32
GetOpenFileNameA
gdi32
GetObjectW
TranslateCharsetInfo
GetObjectA
GetMiterLimit
Escape
GetBkMode
GetStretchBltMode
RectInRegion
GetClipRgn
CreateEnhMetaFileW
GetEnhMetaFileBits
SetDIBitsToDevice
CheckColorsInGamut
FillRgn
GetKerningPairs
SetWindowExtEx
CreateCompatibleBitmap
GetViewportOrgEx
GetColorAdjustment
CreatePatternBrush
UnrealizeObject
PlayEnhMetaFile
user32
SetShellWindow
WindowFromDC
WINNLSGetEnableStatus
ShowCaret
RegisterClassExA
DrawFrameControl
GetCursorInfo
UnregisterClassA
UnregisterClassW
GrayStringA
EnumWindowStationsA
GetMessageA
AdjustWindowRect
GetUserObjectSecurity
RegisterClassA
CharLowerW
MonitorFromPoint
CreateAcceleratorTableA
EqualRect
DispatchMessageA
EnumWindowStationsW
LoadKeyboardLayoutW
SetMenuItemInfoW
wvsprintfA
comctl32
InitCommonControlsEx
shell32
SheChangeDirA
FindExecutableA
SHEmptyRecycleBinA
ShellExecuteExA
RealShellExecuteExA
Sections
.text Size: 375KB - Virtual size: 374KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ