AcroRd32Info.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e535f473e1bb06c71e2bd1036cc1052a0ef77b90efb2862ca8637e5dd9f832de.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e535f473e1bb06c71e2bd1036cc1052a0ef77b90efb2862ca8637e5dd9f832de.exe
Resource
win10v2004-20240802-en
General
-
Target
3ef6e6f52345bf593d7b1acc44937d64.zip
-
Size
388KB
-
MD5
6b4afd1c72c2c3ffb8f6bbfbd8b85bfa
-
SHA1
05fc0ab4c0e8a9a02a7cd8379e2ac1e051e1b4a9
-
SHA256
09b5a44e4ace484f9264006f6a3de0912e1955d3f144b585881f1507101b11c3
-
SHA512
130eb39c8c86300982e4a3991282a04b0718eec8c513325921bcd48117577c14dcba47f075cede0660f3ce6a4e0cbf894277037d72fd86a1e57b0b9ff9344e1b
-
SSDEEP
6144:CjJSM1lNo3QOzYy94iUDExsMDIEH/P+SMBj8DS8Kz+l85BEXxVLuY2HF8xR6Mhb:6NoRzRuiU6psYeP8DyzY8sxVLsOxR6Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e535f473e1bb06c71e2bd1036cc1052a0ef77b90efb2862ca8637e5dd9f832de
Files
-
3ef6e6f52345bf593d7b1acc44937d64.zip.zip
Password: infected
-
e535f473e1bb06c71e2bd1036cc1052a0ef77b90efb2862ca8637e5dd9f832de.exe windows:5 windows x86 arch:x86
Password: infected
403f7818ea58345ded632cf7b4721f30
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapSetInformation
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetFileAttributesW
GetVersionExW
LoadLibraryW
GetLastError
SetLastError
OutputDebugStringA
SetUnhandledExceptionFilter
GetProcessHeap
FreeLibrary
GetVersion
GetModuleFileNameW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
EncodePointer
GetStartupInfoW
InterlockedCompareExchange
Sleep
GetSystemTimeAsFileTime
InterlockedExchange
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcr100
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_invoke_watson
_controlfp_s
_XcptFilter
_cexit
__wgetmainargs
_amsg_exit
_except_handler4_common
wcsstr
memset
_get_heap_handle
malloc
wcsrchr
wcsncpy_s
free
wcsncat_s
_exit
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ