C:\wis-xiyu\73_fayumi\favatoce.pdb
Static task
static1
Behavioral task
behavioral1
Sample
79231c2cacbfc0da610bb317d280a96d0d10e63a5824d5d052e41e57fb85bd6f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
79231c2cacbfc0da610bb317d280a96d0d10e63a5824d5d052e41e57fb85bd6f.exe
Resource
win10v2004-20240802-en
General
-
Target
aee483bf0ab0bbba03e7add1c7b24d70.zip
-
Size
1.2MB
-
MD5
13451bc55f6b6d4d7606dae320822c0f
-
SHA1
fc7f7743819b03e05a55ba5668d4a189d0ecc63d
-
SHA256
dcb4d53f8972063ba7c8b391357484899843e0848a35792a12b981ac066b059e
-
SHA512
d6dbcf438dd1956b2bc69316612ea610c2be4a41f0ccef934e89d96a9b061618b3d6f4ea9adb0e3aca06898578db07fd084a7bf3216c9492136ac34217e7f6aa
-
SSDEEP
24576:DghjpFFc6QFiHQX+6Tv8FORTENeB+S/k0fCVkLDoBVLbdi09l1j0b:MU6YiHQX+W3Ek9XfXEdb9rje
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/79231c2cacbfc0da610bb317d280a96d0d10e63a5824d5d052e41e57fb85bd6f
Files
-
aee483bf0ab0bbba03e7add1c7b24d70.zip.zip
Password: infected
-
79231c2cacbfc0da610bb317d280a96d0d10e63a5824d5d052e41e57fb85bd6f.exe windows:5 windows x86 arch:x86
Password: infected
36c786286bbc25d8ee5ac2239b6c4c04
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
FileTimeToDosDateTime
GetNativeSystemInfo
TlsGetValue
GetStringTypeA
SetLocalTime
HeapAlloc
InterlockedIncrement
GetCommState
ReadConsoleA
GlobalSize
GetSystemWindowsDirectoryW
GlobalLock
SetHandleInformation
CancelWaitableTimer
GetModuleHandleW
ActivateActCtx
LoadLibraryW
TerminateThread
GetConsoleAliasExesLengthW
GetCompressedFileSizeA
GetSystemDirectoryA
CompareStringW
lstrlenW
SetThreadPriority
WritePrivateProfileStringW
DeactivateActCtx
GetNamedPipeHandleStateW
GetPrivateProfileIntW
VerifyVersionInfoW
CreateDirectoryA
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetCPInfoExW
GetLastError
GetThreadLocale
GetProcAddress
GetProcessHeaps
SetStdHandle
EnterCriticalSection
DisableThreadLibraryCalls
GetPrivateProfileStringA
LoadLibraryA
LocalAlloc
SetSystemTime
SetEnvironmentVariableA
GetOEMCP
Process32NextW
FindNextFileA
WriteProfileStringA
FindFirstChangeNotificationA
QueryMemoryResourceNotification
FreeEnvironmentStringsW
EnumResourceNamesA
WriteProfileStringW
GetCurrentDirectoryA
GetCurrentThreadId
GetCPInfoExA
FindAtomW
UnregisterWaitEx
GetProfileSectionW
LCMapStringW
CopyFileExA
GetVolumeInformationW
CreateFileA
GetConsoleOutputCP
MultiByteToWideChar
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
InterlockedDecrement
GetACP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
WideCharToMultiByte
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
WriteConsoleA
user32
GetMenuItemID
winhttp
WinHttpWriteData
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 19.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12.3MB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ