C:\Burgoe\Acneabsow\Moldopsbe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1f1ecc3ac5687a880b066fc20a7df4af112922971c6cd2125d5c337e1ff6e059.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1f1ecc3ac5687a880b066fc20a7df4af112922971c6cd2125d5c337e1ff6e059.exe
Resource
win10v2004-20240802-en
General
-
Target
1f1ecc3ac5687a880b066fc20a7df4af112922971c6cd2125d5c337e1ff6e059
-
Size
191KB
-
MD5
74a9158a7bacad79dd4a78191aa4b5db
-
SHA1
2b93db1eed9fd5ed81b19ed715a9e8fae1ed6d01
-
SHA256
1f1ecc3ac5687a880b066fc20a7df4af112922971c6cd2125d5c337e1ff6e059
-
SHA512
c462285b53655ef37742b84b0811bd3642272d3986a8ffad7a2e70b5521197a72aa0b8914e27c60c70d0a5ed82985574de0bd641537a0186f86ce207627551d7
-
SSDEEP
3072:qh+Y23Vihm4QCDulU0jtNBygSmAJM/DSDL8EoLXby4TR4jDPwiPazFWS3:qhG3VUpQOul3GgIuSDL8XLbxijDPJPaX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f1ecc3ac5687a880b066fc20a7df4af112922971c6cd2125d5c337e1ff6e059
Files
-
1f1ecc3ac5687a880b066fc20a7df4af112922971c6cd2125d5c337e1ff6e059.exe windows:5 windows x86 arch:x86
85d85513b4a92c66090e93b46cfa107a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
toupper
_itow
shlwapi
PathAddExtensionA
ChrCmpIW
IsCharSpaceA
ChrCmpIA
ord29
PathGetArgsA
kernel32
GetConsoleAliasExesLengthW
GetSystemDefaultLangID
GetEnvironmentVariableW
GetDriveTypeW
GetSystemDefaultLCID
GetCurrentThread
GetVolumeInformationA
CreateProcessA
IsDBCSLeadByte
GetEnvironmentVariableA
GetACP
GetConsoleOutputCP
IsDBCSLeadByteEx
SetLastError
DefineDosDeviceW
LockResource
GetOEMCP
FillConsoleOutputAttribute
GetCurrentThreadId
GetPrivateProfileSectionW
SetFileAttributesW
GetVolumeInformationW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
SetErrorMode
LoadLibraryExW
GetEnvironmentStringsW
GetConsoleAliasesLengthA
GetCommandLineA
GetDriveTypeA
GetStdHandle
GetVersion
GetCurrentProcessId
GetCurrentProcess
SetFileApisToOEM
GetCommandLineW
GlobalSize
QueryPerformanceCounter
GetProcessHeap
lstrlenW
GetDiskFreeSpaceExA
user32
InSendMessage
GetPropW
DestroyIcon
GetDlgCtrlID
SetClipboardData
SetWindowTextA
ReleaseCapture
UnhookWindowsHookEx
SetWindowsHookExW
InsertMenuW
GetKeyboardType
wvsprintfA
DestroyCaret
SetWindowLongW
CheckMenuItem
PeekMessageA
GetWindowLongW
GetClipboardOwner
GetMessagePos
MapVirtualKeyA
GetKeyboardLayout
GetCapture
IsCharUpperW
ShowCaret
GetProcessWindowStation
IsClipboardFormatAvailable
DeleteMenu
GetSubMenu
GetKeyState
SetCapture
GetTopWindow
IsMenu
CloseClipboard
GetClipboardData
GetWindow
SetClipboardViewer
SwitchDesktop
IsDlgButtonChecked
GetClassLongW
SetMenuItemBitmaps
GetMessageExtraInfo
GetThreadDesktop
TrackPopupMenu
MapVirtualKeyW
GetWindowTextLengthW
DdeSetQualityOfService
IsCharUpperA
IsWindowUnicode
IsChild
SetCursor
GetWindowThreadProcessId
RegisterHotKey
GetProcessDefaultLayout
SetCaretPos
RemoveMenu
ClipCursor
IsCharLowerW
GetSysColorBrush
DestroyCursor
SetClassLongA
SetScrollPos
CheckMenuRadioItem
EnumClipboardFormats
FindWindowExA
GetParent
IsCharAlphaA
HideCaret
DestroyAcceleratorTable
TranslateAcceleratorW
CopyAcceleratorTableW
IsCharAlphaNumericA
GetClassLongA
GetShellWindow
SetRect
EmptyClipboard
BringWindowToTop
gdi32
SetMapMode
CreateMetaFileA
PtInRegion
CombineRgn
OffsetRgn
GetStockObject
SetRectRgn
ole32
CoInitializeEx
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.treg Size: 31KB - Virtual size: 31KB
IMAGE_SCN_MEM_READ
.rerf Size: 17KB - Virtual size: 16KB
IMAGE_SCN_MEM_READ
.hgfg Size: 21KB - Virtual size: 20KB
IMAGE_SCN_MEM_READ
.tirg Size: 17KB - Virtual size: 17KB
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_MEM_READ