C:\serisuze.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7d5d5c3a22d16d1537581ff7887ef4e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7d5d5c3a22d16d1537581ff7887ef4e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7d5d5c3a22d16d1537581ff7887ef4e0N
-
Size
4.4MB
-
MD5
7d5d5c3a22d16d1537581ff7887ef4e0
-
SHA1
13989fc5a90406cf2d6cfa94f5acae8857404ade
-
SHA256
4aa03edec78c1235510cf80b72b1806c0c2273bf3ae6c2d1b6c49279caed99cb
-
SHA512
43f36e6c39443723596a29084aa86b2856cb5d4cd4346ca8c31f79bfbf9bb054236676233e823789133a1e031023f4e283229e4ce8f4de70a3198b4d9b94aa35
-
SSDEEP
98304:JsVNWL4Q4V7b4+6c5I2RCERmkjB4pcMXg8Shaglvn40ir/7Dwid9:4NWL4QOQMHDRmkjGMDhagv40irHw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d5d5c3a22d16d1537581ff7887ef4e0N
Files
-
7d5d5c3a22d16d1537581ff7887ef4e0N.exe windows:5 windows x86 arch:x86
619290075042aa4a8feb771726744aeb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
GetCommandLineW
GetTempFileNameW
GetPrivateProfileSectionNamesW
EnumResourceNamesW
GlobalFix
SetVolumeLabelA
SearchPathW
lstrlenA
WritePrivateProfileStructA
CopyFileExW
SetLocalTime
GetDriveTypeW
DebugActiveProcessStop
SetEndOfFile
BuildCommDCBAndTimeoutsA
SystemTimeToTzSpecificLocalTime
DeleteVolumeMountPointA
ScrollConsoleScreenBufferW
SetConsoleActiveScreenBuffer
CreateJobObjectW
GetProfileSectionA
GetUserDefaultLCID
WriteConsoleInputA
SetComputerNameW
AddConsoleAliasW
FlushConsoleInputBuffer
ConnectNamedPipe
FreeEnvironmentStringsA
GetProcessPriorityBoost
IsBadReadPtr
EnumTimeFormatsW
GetUserDefaultLangID
SetCommState
TlsSetValue
FindResourceExA
GlobalAlloc
GetPrivateProfileIntA
GetVolumeInformationA
GetConsoleMode
GetSystemPowerStatus
SetConsoleCP
GlobalFlags
HeapCreate
GetFileAttributesW
MulDiv
WriteConsoleW
GetAtomNameW
GetTimeZoneInformation
GetConsoleFontSize
GetBinaryTypeW
RaiseException
DeactivateActCtx
GetConsoleOutputCP
VerifyVersionInfoW
FreeLibraryAndExitThread
GetHandleInformation
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
VirtualAlloc
CreateNamedPipeA
LocalLock
CopyFileA
SetComputerNameA
EnterCriticalSection
LoadLibraryA
OpenThread
OpenMutexA
OpenWaitableTimerW
LocalAlloc
MoveFileA
SetConsoleDisplayMode
GetProfileStringA
SetFileApisToANSI
SetCommMask
GetTapeParameters
WaitForMultipleObjects
SetSystemTime
SetEnvironmentVariableA
GlobalWire
GetOEMCP
CreateIoCompletionPort
GetModuleHandleA
RequestWakeupLatency
GetConsoleCursorInfo
OpenSemaphoreW
GetVersionExA
WriteFileEx
lstrcpyA
GetCommandLineA
GetStartupInfoA
HeapValidate
LeaveCriticalSection
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleW
Sleep
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
TlsGetValue
TlsAlloc
TlsFree
HeapDestroy
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
GetACP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
WriteConsoleA
MultiByteToWideChar
SetFilePointer
RtlUnwind
DebugBreak
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
ReadFile
user32
GetComboBoxInfo
GetTitleBarInfo
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.2MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ