C:\dibobebutufup\puwirepim.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
204caa2ba2db789fa4a1c8ace473887e0710ba4363ef249d7b7a403ee76ebd0e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
204caa2ba2db789fa4a1c8ace473887e0710ba4363ef249d7b7a403ee76ebd0e.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
204caa2ba2db789fa4a1c8ace473887e0710ba4363ef249d7b7a403ee76ebd0e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
204caa2ba2db789fa4a1c8ace473887e0710ba4363ef249d7b7a403ee76ebd0e.exe
Resource
win11-20240802-en
General
-
Target
204caa2ba2db789fa4a1c8ace473887e0710ba4363ef249d7b7a403ee76ebd0e
-
Size
229KB
-
MD5
96f86193c996818b2407b5452285d298
-
SHA1
da0ede06a04b4eba4d6d196c045c37ff31592e53
-
SHA256
204caa2ba2db789fa4a1c8ace473887e0710ba4363ef249d7b7a403ee76ebd0e
-
SHA512
cf2cec332403d958d326459f8abec2a62150f102a838387c3b30d1e5d40770d02f94f0ced99977dd62928496ee843131457ed74c9b4364bb1f8cfe9f4a69f4dc
-
SSDEEP
3072:FjyVsLwLOzDgpDSXsInASyySSuI/vjLE3rvNAYfipNV47UJrFp4vIak:FUsLUUE9SXHA3y9uIXjg3JdfipT4C4w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 204caa2ba2db789fa4a1c8ace473887e0710ba4363ef249d7b7a403ee76ebd0e
Files
-
204caa2ba2db789fa4a1c8ace473887e0710ba4363ef249d7b7a403ee76ebd0e.exe windows:5 windows x86 arch:x86
3df16b5c8832924f7e7c9119726270b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasesLengthW
GetLocaleInfoA
WriteConsoleOutputCharacterA
InterlockedDecrement
QueryDosDeviceA
InterlockedCompareExchange
GetComputerNameW
CreateHardLinkA
GetTickCount
VirtualFree
GlobalFindAtomA
LoadLibraryW
SetCommConfig
SetConsoleMode
WriteConsoleW
SetComputerNameExW
SetThreadPriority
GetStartupInfoW
FindFirstChangeNotificationW
SetLastError
GetProcAddress
VirtualAlloc
SetComputerNameA
InterlockedExchangeAdd
LocalAlloc
TransmitCommChar
AddAtomW
FindFirstVolumeMountPointA
GetModuleHandleA
IsDebuggerPresent
GetStringTypeW
GetCurrentProcessId
ResetWriteWatch
DeleteFileA
lstrcpyA
SetThreadContext
GetLastError
GetComputerNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
HeapFree
RaiseException
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
HeapSize
gdi32
StrokeAndFillPath
GetCharABCWidthsFloatW
shell32
ShellAboutA
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ