C:\hesisuficuti39\poxeti\ficoveroput39_fabejaka72_reja.pdb
Static task
static1
Behavioral task
behavioral1
Sample
94999d1dacca1ec7527f3aca2dc6d6650d71f32a10d141bda8e86d1680372d32.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94999d1dacca1ec7527f3aca2dc6d6650d71f32a10d141bda8e86d1680372d32.exe
Resource
win10v2004-20240802-en
General
-
Target
5b71eafbe78dfb0cfe34d51e78f4b646.zip
-
Size
7.4MB
-
MD5
9af60ea54694c9f51a3ede2f95e0cf8e
-
SHA1
2203aa2c4a04ff230cd340cb7a2422001f69c2b0
-
SHA256
220cb3d864feefe0bb4828d09886d0669ac33ac7a9969fed38908b8238d1b438
-
SHA512
46636f7efae0a96e9374b607ca47658f85d42d23e45e559fd367cea7d863f4ceefd9fa812e495e945d43d0e28d3453629ca1c36d7e9a80c21321a08e0559649e
-
SSDEEP
196608:jnluxWL845wJfwb6ukuWmxLN3mmtHeJI8b7:jwELR5wJfmNLN3m++B7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/94999d1dacca1ec7527f3aca2dc6d6650d71f32a10d141bda8e86d1680372d32
Files
-
5b71eafbe78dfb0cfe34d51e78f4b646.zip.zip
Password: infected
-
94999d1dacca1ec7527f3aca2dc6d6650d71f32a10d141bda8e86d1680372d32.exe windows:5 windows x86 arch:x86
Password: infected
3cd0350cb20713093b4eb51a8785dabd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
UpdateResourceA
InterlockedIncrement
GetEnvironmentStringsW
SetEvent
OpenSemaphoreA
GetSystemTimeAsFileTime
GetCommandLineA
WriteFileGather
CreateActCtxW
EnumResourceTypesA
GlobalAlloc
LeaveCriticalSection
GetFileAttributesA
FindNextVolumeW
ReadFile
GetLocaleInfoA
GetDevicePowerState
GetProcAddress
HeapSize
VerLanguageNameA
RemoveDirectoryA
FreeUserPhysicalPages
GlobalGetAtomNameA
PrepareTape
WriteConsoleA
GetProcessId
WaitForMultipleObjects
GetModuleFileNameA
GetModuleHandleA
ReleaseMutex
EndUpdateResourceA
FindFirstVolumeW
AddConsoleAliasA
lstrcpyW
HeapReAlloc
HeapAlloc
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
SetHandleCount
GetFileType
GetLastError
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
CreateFileA
user32
GetCursorPos
gdi32
GetCharWidthFloatA
advapi32
DeregisterEventSource
Exports
Exports
@SetFirstEverVice@8
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 533KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10.8MB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ