c:\shape\time\depend\Nose\835\Name.pdb
Static task
static1
Behavioral task
behavioral1
Sample
990ec0811faa820e58006989d75d485a6a1acc41f51e5d6311e3bdb3ea1c0b9b.dll
Resource
win7-20240704-en
General
-
Target
e43f171d207bf9834207573433d16e19.zip
-
Size
398KB
-
MD5
5ef09920464a01bfeb0fe2fe4b2305e8
-
SHA1
643fa0788e505642f8109109d3404b6ab21e63cf
-
SHA256
0be66f5908d57d096ec76799514ee5bff378e8f8471765583c622f69c318d855
-
SHA512
6d55ad86709edba0e0a54474f33ecd52ace742ffe2369acebc4851e2238ffe3d3286ae7868b2f9f86f9be3e305031e0c9636924321e6d716681e71d6b0d7fe20
-
SSDEEP
12288:r2nRmwHwJBI+1oh1KV+um1dgsMY6IBps+ee1RwNVSly:r2RmwMIgZl+/7I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/990ec0811faa820e58006989d75d485a6a1acc41f51e5d6311e3bdb3ea1c0b9b
Files
-
e43f171d207bf9834207573433d16e19.zip.zip
Password: infected
-
990ec0811faa820e58006989d75d485a6a1acc41f51e5d6311e3bdb3ea1c0b9b.dll windows:4 windows x86 arch:x86
Password: infected
0e85111d46389e6a0b245ea738757602
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
FileTimeToLocalFileTime
CreateEventW
GetVersion
Sleep
GetCurrentThreadId
GetProcAddress
LoadLibraryW
GetEnvironmentVariableW
VirtualProtectEx
GetWindowsDirectoryW
SetConsoleOutputCP
CreateSemaphoreW
GetTempPathW
CompareStringW
CompareStringA
CreateFileA
SetStdHandle
SetFilePointer
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CloseHandle
HeapSize
GetLocaleInfoW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LoadLibraryA
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
WriteFile
HeapReAlloc
VirtualAlloc
InterlockedIncrement
InterlockedDecrement
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetLastError
WideCharToMultiByte
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetTimeFormatA
GetDateFormatA
FatalAppExitA
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
GetACP
GetOEMCP
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
RtlUnwind
LCMapStringA
LCMapStringW
GetTimeZoneInformation
SetEnvironmentVariableA
user32
BeginDeferWindowPos
DeferWindowPos
CreateMenu
UnregisterHotKey
LoadCursorW
TranslateMessage
RegisterWindowMessageW
psapi
GetMappedFileNameW
GetDeviceDriverBaseNameW
EnumProcesses
GetModuleInformation
GetPerformanceInfo
EnumProcessModules
GetDeviceDriverFileNameW
EnumDeviceDrivers
GetModuleBaseNameW
GetModuleFileNameExW
EnumPageFilesW
EmptyWorkingSet
Exports
Exports
AndSegment
Continuetone
Morning
Sections
.text Size: 184KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 686KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ