C:\yiyonolezahepe\bozarexo75_butuleyejawa-solujosonarug\ro.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6ab7801a80f78c2586d0bd611807f3f8229300a32efc7b6793d7b2a8d1d28371.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6ab7801a80f78c2586d0bd611807f3f8229300a32efc7b6793d7b2a8d1d28371.exe
Resource
win10v2004-20240802-en
General
-
Target
e26b4f39f4c64f8f9b4d1d607c1d4450.zip
-
Size
163KB
-
MD5
426e556ca0d35ac3b4533fc3a57b3bc9
-
SHA1
7633afb7d7964addd515cec4c00819b3da08fba7
-
SHA256
239146a726ae9502565a81171e631f7d195a8dc4e3383925b744bb99ff370ead
-
SHA512
2db928bcaa0d24da13c788731262fb1f367a1e53814e0400426bae0be6de4f533cf21cc71b47eebc5dfcc9ee4b97b9fc7deb47dc1c8496a5901739d3016c5808
-
SSDEEP
3072:Obqx4ypVBTG78GIRZWu41xm2R36hlBiPrhSIScvbRBxDp0K+tCJAtbpkrg85jY7:KyNi78Gqq1xnR3ClBi9Ssd2LJtberBM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6ab7801a80f78c2586d0bd611807f3f8229300a32efc7b6793d7b2a8d1d28371
Files
-
e26b4f39f4c64f8f9b4d1d607c1d4450.zip.zip
Password: infected
-
6ab7801a80f78c2586d0bd611807f3f8229300a32efc7b6793d7b2a8d1d28371.exe windows:5 windows x86 arch:x86
f9ea7fd19aba2d67c1ba609de266a8db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FileTimeToDosDateTime
DosDateTimeToFileTime
CreateTimerQueue
FindFirstChangeNotificationW
SetFilePointer
SetFirmwareEnvironmentVariableA
GetSystemWindowsDirectoryW
FlushViewOfFile
FreeEnvironmentStringsA
OutputDebugStringW
GetModuleHandleW
GetPrivateProfileStringW
GetSystemWow64DirectoryA
CreateActCtxW
GetDriveTypeA
_hread
GetVersionExW
VerifyVersionInfoA
GetModuleFileNameW
GetOverlappedResult
CompareStringW
lstrlenW
GetStartupInfoW
InterlockedExchange
SetCurrentDirectoryA
GetLastError
IsDBCSLeadByteEx
GetCurrentDirectoryW
GetProcAddress
GetLongPathNameA
VirtualAlloc
SetVolumeLabelW
GetConsoleDisplayMode
CreateMemoryResourceNotification
SearchPathA
LoadLibraryA
OpenMutexA
LocalAlloc
SetFileApisToANSI
WriteProfileSectionW
AddAtomA
HeapWalk
FindAtomA
SetEnvironmentVariableA
WTSGetActiveConsoleSessionId
SetConsoleCursorInfo
GetThreadPriority
GetProcessShutdownParameters
FreeEnvironmentStringsW
RequestWakeupLatency
GetCPInfoExA
GetVersionExA
DeleteFileW
AddConsoleAliasA
CloseHandle
CreateFileW
SetStdHandle
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MoveFileA
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetCommandLineA
HeapSetInformation
RaiseException
ExitProcess
WriteFile
GetStdHandle
IsProcessorFeaturePresent
HeapValidate
IsBadReadPtr
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
WriteConsoleW
GetFileType
LoadLibraryW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
RtlUnwind
MultiByteToWideChar
LCMapStringW
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
user32
GetMessageTime
DrawFrameControl
msimg32
GradientFill
Sections
.text Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ