c:\331-Floor\sight\Ground\754\chair.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c56ebda9d69cd076d17f7a71418d14c7a0863925f009205bf634a56a305410e8.dll
Resource
win7-20240729-en
General
-
Target
4d81d65da26223fd26b4aedcbfd43758.zip
-
Size
254KB
-
MD5
cf501ecee1e244ec95a1ffc500121d28
-
SHA1
e51ad87f1c7bb86343e55e243247246604252783
-
SHA256
a4af1b3e722bb38f9386866077f51a63a2a0e231c84eead4973b850911cebfe3
-
SHA512
b3e8fc89b87da1151d764b0012a6e0cd4d3b5bc7224888a87698c50dd92253b3f50574468230215257d8bc0bea2fdee7a0d7d669f5f6abca1d289848800d3c62
-
SSDEEP
6144:c+Jj4cC/tuBydNyWymcG3Dza6LWuYuUoGigP7fZnG7fVE0f:vjm/tuBlWtc4hLDYVotfVEq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c56ebda9d69cd076d17f7a71418d14c7a0863925f009205bf634a56a305410e8
Files
-
4d81d65da26223fd26b4aedcbfd43758.zip.zip
Password: infected
-
c56ebda9d69cd076d17f7a71418d14c7a0863925f009205bf634a56a305410e8.dll windows:6 windows x86 arch:x86
Password: infected
8ab28ff89ea1dd5f7e70bef00986ad9b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetEnvironmentVariableA
LoadLibraryA
OpenMutexA
GetModuleFileNameA
VirtualProtect
GetCurrentDirectoryA
GetFileTime
GetVersion
GetTempPathA
CloseHandle
WriteConsoleW
CreateProcessA
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetStringTypeW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
CreateEventA
GetWindowsDirectoryA
SetFilePointerEx
ExitProcess
GetDateFormatW
OutputDebugStringW
GetLastError
HeapFree
HeapAlloc
EncodePointer
DecodePointer
HeapReAlloc
GetCommandLineA
GetCurrentThreadId
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetModuleFileNameW
HeapSize
SetLastError
GetCurrentThread
GetFileType
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
CreateFileW
user32
IsDialogMessageA
LoadBitmapA
SendMessageTimeoutA
SetWindowTextA
GetIconInfo
CheckDlgButton
ole32
CoInitialize
CLSIDFromString
OleUninitialize
OleSetContainedObject
CoCreateInstance
OleInitialize
CoUninitialize
advapi32
RegCreateKeyA
RegQueryValueExA
RegCloseKey
xolehlp
DtcGetTransactionManagerExA
Exports
Exports
Beat
Brightdirect
Coldrather
Dividesudden
SugarAnd
Sections
.text Size: 190KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 213KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1016B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ