uiopferta.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c3ca008879db1055ddf46967f71f076689a83ec4543d6fe081c6b29658ff1e42.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c3ca008879db1055ddf46967f71f076689a83ec4543d6fe081c6b29658ff1e42.exe
Resource
win10v2004-20240802-en
General
-
Target
ccc56e2124769f030504f023baadaf0a.zip
-
Size
10KB
-
MD5
14ec1698937f8f5b920304ce92157113
-
SHA1
b05654e2666bf1d0cfc55d56a8fecf4850e437d4
-
SHA256
aea413bcb47d8f7908f17d594efef462c62d670ab1550540d8c8d95298ac0b3f
-
SHA512
59fd3e1dadd019c66f7a83926ae19cc1d49319c3e1ea7dbeb14a89427522807fa775dbc3eecf1e4078b207ef4ab3a78ca58d869dacbd603aa524e0e9fd664368
-
SSDEEP
192:XvEtJa51+Mk0DOQLz2m7j9s03t+s6x4oxgXhuPhFXXWmb5UNGowal3K6NzCCu:/Ea5/OQL6mFs4xXhyFna3KgCr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/c3ca008879db1055ddf46967f71f076689a83ec4543d6fe081c6b29658ff1e42
Files
-
ccc56e2124769f030504f023baadaf0a.zip.zip
Password: infected
-
c3ca008879db1055ddf46967f71f076689a83ec4543d6fe081c6b29658ff1e42.exe windows:4 windows x86 arch:x86
Password: infected
222e7b320f36011feb1642000d8fa826
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
cryptdll
CDBuildVect
MD5Update
CDLocateRng
MD5Init
shell32
DragAcceptFiles
SHCreateShellItem
ShellAboutA
SHGetFileInfoA
StrChrA
SHFileOperationA
DragQueryFileA
FreeIconList
SHGetDataFromIDListA
SHGetDiskFreeSpaceA
FindExecutableA
SHGetDesktopFolder
ShellMessageBoxW
SHGetFolderPathA
SHGetMalloc
DragFinish
dbnmpntw
ConnectionClose
ConnectionWrite
ConnectionError
kernel32
FileTimeToSystemTime
SearchPathA
OpenMutexA
GetPrivateProfileIntW
GetModuleHandleW
GetLocalTime
ReadConsoleW
FindFirstFileA
GetEnvironmentVariableA
DeviceIoControl
SetEnvironmentVariableW
CompareStringW
GetStringTypeW
IsValidCodePage
lstrcmpiA
lstrcmpA
TlsGetValue
GetProcAddress
GetTickCount
WriteConsoleA
lstrcpynW
GetLastError
CreateDirectoryA
GetCurrentDirectoryW
SetErrorMode
SleepEx
InterlockedDecrement
GetFullPathNameW
GetPrivateProfileIntW
IsBadStringPtrA
Sections
.sdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
tkjdelw Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ