C:\hesisuficuti39\poxeti\ficoveroput39_fabejaka72_reja.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8f770e85d9789cd77a5ebdf321ae54f5162d4b28c9f929ba4bf109bb770acfda.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f770e85d9789cd77a5ebdf321ae54f5162d4b28c9f929ba4bf109bb770acfda.exe
Resource
win10v2004-20240802-en
General
-
Target
fc8b39e1550508fc277adb212c06b4d858eec204fe9157947fcd8db28296a1d4
-
Size
9.9MB
-
MD5
e81b146b59e15eac54134447700222a8
-
SHA1
5bedbe1b9f0e3f145784f01e607b77ffa5c62403
-
SHA256
fc8b39e1550508fc277adb212c06b4d858eec204fe9157947fcd8db28296a1d4
-
SHA512
32c4513d02df5dca9069381473bc11d161bff78210868bf5cd629eda4b58a83a66f0f9d7b71f7a4077322372474a0a5035ac40121b673eaf18750ee6fa0a8272
-
SSDEEP
196608:hBvQ42JxvG4YULhzKrQqxdiY4N7F7xWGoiMUA1er41IvxRSytJqdQ3oY3B2:mJxoUVzKklRF7IGEUA1eUQnJQQ3oYR2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/8f770e85d9789cd77a5ebdf321ae54f5162d4b28c9f929ba4bf109bb770acfda
Files
-
fc8b39e1550508fc277adb212c06b4d858eec204fe9157947fcd8db28296a1d4.zip
Password: infected
-
8f770e85d9789cd77a5ebdf321ae54f5162d4b28c9f929ba4bf109bb770acfda.exe windows:5 windows x86 arch:x86
3cd0350cb20713093b4eb51a8785dabd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
UpdateResourceA
InterlockedIncrement
GetEnvironmentStringsW
SetEvent
OpenSemaphoreA
GetSystemTimeAsFileTime
GetCommandLineA
WriteFileGather
CreateActCtxW
EnumResourceTypesA
GlobalAlloc
LeaveCriticalSection
GetFileAttributesA
FindNextVolumeW
ReadFile
GetLocaleInfoA
GetDevicePowerState
GetProcAddress
HeapSize
VerLanguageNameA
RemoveDirectoryA
FreeUserPhysicalPages
GlobalGetAtomNameA
PrepareTape
WriteConsoleA
GetProcessId
WaitForMultipleObjects
GetModuleFileNameA
GetModuleHandleA
ReleaseMutex
EndUpdateResourceA
FindFirstVolumeW
AddConsoleAliasA
lstrcpyW
HeapReAlloc
HeapAlloc
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
SetHandleCount
GetFileType
GetLastError
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
CreateFileA
user32
GetCursorPos
gdi32
GetCharWidthFloatA
advapi32
DeregisterEventSource
Exports
Exports
@SetFirstEverVice@8
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 533KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14.5MB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ