C:\c_code\helper\windows\executer\Release\executer.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cefe1de7f79760492b478fc554908cc2f10aa64935fa5b405d07d305259e9ea0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cefe1de7f79760492b478fc554908cc2f10aa64935fa5b405d07d305259e9ea0.exe
Resource
win10v2004-20240802-en
General
-
Target
727dcf29b6f3bdfbb21c3791b0de2cbf.zip
-
Size
28KB
-
MD5
bb47c87610ba4a7d39e01b30aeeeac44
-
SHA1
84703a8d2e2c5e818b5ea7b0775bcb544d8abab9
-
SHA256
193ed177f0b2d6783e92567d3695e4ce5cb9b35739e024eeb3c86aa5f5442c89
-
SHA512
4fbea7b5e83b657c2ef8bd56dccf3a31c2d22a5341c844cbcd538e8f8e510806b30237d4b569c3b1201636b1f6345df7fe90887904cc9c24f5f7c0fa266e3bc4
-
SSDEEP
768:AtYb/frBcHswnc3oOsYV1Y1t37VrTWl5q5WK:QY/lcLcsYHWVNkK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/cefe1de7f79760492b478fc554908cc2f10aa64935fa5b405d07d305259e9ea0
Files
-
727dcf29b6f3bdfbb21c3791b0de2cbf.zip.zip
Password: infected
-
cefe1de7f79760492b478fc554908cc2f10aa64935fa5b405d07d305259e9ea0.exe windows:6 windows x86 arch:x86
Password: infected
742aceb7bf14064f81e7946ab54f9e12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcessHeap
GetExitCodeProcess
Sleep
GetModuleFileNameW
CreateProcessW
GetModuleHandleW
CopyFileW
GetTickCount
MoveFileW
HeapAlloc
0
G
�P}H���1�)9�
z
C
CreateThread
CloseHandle
TerminateThread
GetLastError
WaitForSingleObject
CreateFileW
WriteFile
GetCurrentProcess
HeapFree
GetStdHandle
SetConsoleTextAttribute
GetVersionExW
CreateDirectoryW
user32
wsprintfW
SendInput
ReleaseDC
GetSystemMetrics
FindWindowW
SendMessageW
GetDC
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteObject
BitBlt
advapi32
RegOpenKeyExW
RegQueryValueExW
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
shlwapi
PathFileExistsW
PathRemoveFileSpecW
PathFindFileNameW
Gd
GdipDisposeImage
GdipGetImageEncodersSize
GdipSaveImageToFile
PY0J���~�W4��
4��
$"
PY0J���~�W4��
��@�)�Robin
$
��
in
�
�
�
L
A
�)9�
�1�)9
1C�̣���8
u�n
j
P}H���1�)9�
9�
d
͇r���U
�"S���K�����D�
��o
��D�
r
������
\
R
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 892B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ