E:\nbuE\rrahgs\ygUizzm\oMjTiL.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cb9758236682bd9631ad0ebc966ade80N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb9758236682bd9631ad0ebc966ade80N.exe
Resource
win10v2004-20240802-en
General
-
Target
cb9758236682bd9631ad0ebc966ade80N.exe
-
Size
136KB
-
MD5
cb9758236682bd9631ad0ebc966ade80
-
SHA1
6082d3d41888e70830e9ee20ca4c04244ee03f8b
-
SHA256
9a7f0afa71fd8d14dafebf30fd6618001d950a1f0582135f21f92968930d762d
-
SHA512
3d8be386b1597fe5c944f474cb038e239776588e88c2bd808fb16d97348454febc7ea433f0d31a66cf65f745fff9375cca1cb12fe52c02ad173710968e964b96
-
SSDEEP
3072:Tvo3IGKSE8JXgiEy9fi61pewMh4CRr4wsrtITaAWUwx:To4GDEaQiEO0wMdZUrtjhx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb9758236682bd9631ad0ebc966ade80N.exe
Files
-
cb9758236682bd9631ad0ebc966ade80N.exe.exe windows:5 windows x86 arch:x86
c70c50b37fa68535c7b5b77c44007462
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
SetClassLongW
GetDC
LoadIconA
MapVirtualKeyA
InvalidateRect
DefWindowProcW
OpenIcon
EndPaint
ScrollWindow
AdjustWindowRect
SetLastErrorEx
UnionRect
TabbedTextOutW
DialogBoxParamA
TileWindows
IsCharAlphaW
GetClipCursor
DestroyAcceleratorTable
SystemParametersInfoA
SetUserObjectInformationW
SetDlgItemTextW
CharNextW
GetWindowLongW
GetCaretPos
IsWindowUnicode
CharLowerBuffW
PeekMessageA
GetKeyboardType
kernel32
GetCommModemStatus
lstrcmpiA
OpenEventA
lstrcpynW
MoveFileExW
EnumResourceLanguagesA
ClearCommError
IsBadCodePtr
ReleaseSemaphore
SuspendThread
lstrcpyA
HeapSize
GetPriorityClass
SearchPathA
shlwapi
StrToIntW
UrlGetPartA
gdi32
Ellipse
GetTextCharsetInfo
GetDIBits
SetStretchBltMode
CreateSolidBrush
GetBitmapBits
GetBkMode
CreateFontIndirectW
TextOutW
SetDIBits
EndPage
FillRgn
RectInRegion
Exports
Exports
?yefnfdJOBPY_l_xxn_x_@@YGJ_N@Z
?_sggcCI___V@@YGDEH@Z
?tkzfc_xz_rJ__VC_Lu@@YGPAHPAHPAH@Z
?_NPBUK_senhzax_a_p@@YGXPAG@Z
Sections
.text Size: 56KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ