C:\Users\admin\Documents\Visual Studio 2008\Projects\test1\x64\Release\test1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
107300e84cf6a2b217ba019499dd33e965ec03ec70009a4361d1c067264d282f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
107300e84cf6a2b217ba019499dd33e965ec03ec70009a4361d1c067264d282f.exe
Resource
win10v2004-20240802-en
General
-
Target
107300e84cf6a2b217ba019499dd33e965ec03ec70009a4361d1c067264d282f.zip
-
Size
196KB
-
MD5
0e5a14fc5e8be78e56226aa1dde74bd2
-
SHA1
7f888f0eeb29febf9e13dd8d3b4f60cf73b8cee0
-
SHA256
a141b7da44e8d088cfb362e393dcea9971dc02d7adc3015a4974aff1ff56db42
-
SHA512
898ce59861893c8c8fd8ccf1d29d96334171c69500a1836c2f435885a1dc278fda0c50b9661ffad5621baefeb9c3faa5edd764910c6dba35f35ae38e6db47f4f
-
SSDEEP
3072:OzzzbrRpc+ycoMxtNrSoTpZvjKQ4htKjYc78XF+Rg3S9opLQV:OtuoNrN/X4htTc7U+GC9oVy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/107300e84cf6a2b217ba019499dd33e965ec03ec70009a4361d1c067264d282f.exe
Files
-
107300e84cf6a2b217ba019499dd33e965ec03ec70009a4361d1c067264d282f.zip.zip
Password: infected
-
107300e84cf6a2b217ba019499dd33e965ec03ec70009a4361d1c067264d282f.exe.exe windows:5 windows x64 arch:x64
3904c7d038111f6b91388896c69225a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetTickCount
Sleep
GetProcAddress
LoadLibraryA
GetModuleHandleA
WriteProcessMemory
GetModuleHandleW
ExitProcess
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
GetLastError
FlsAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapAlloc
HeapReAlloc
user32
MessageBoxA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 566B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ