H:\xBzxzQBbAN.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3b5cf35562c1092214688cca98fa273d3ded5b3d7eba5855a935ffd0b8e9db56N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b5cf35562c1092214688cca98fa273d3ded5b3d7eba5855a935ffd0b8e9db56N.exe
Resource
win10v2004-20240802-en
General
-
Target
3b5cf35562c1092214688cca98fa273d3ded5b3d7eba5855a935ffd0b8e9db56N.exe
-
Size
261KB
-
MD5
e855189df35fa64d5760036d14793f90
-
SHA1
5eda5d7a26280b684cd4514c554b646893eb8d47
-
SHA256
3b5cf35562c1092214688cca98fa273d3ded5b3d7eba5855a935ffd0b8e9db56
-
SHA512
aa53c16ee21fa2aacf7daacc57d8fa5f702c6e033cc777a6692727a84f1b5b2225c522e7cda30355d65b5d46d3030db6b76b833a49f9246c2422146895869629
-
SSDEEP
6144:CbsUESHsRQKfwZgXhsoTDiKf5zHEXL67ubpXd6F:C4UESMRQuYUHi45TE767Yd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b5cf35562c1092214688cca98fa273d3ded5b3d7eba5855a935ffd0b8e9db56N.exe
Files
-
3b5cf35562c1092214688cca98fa273d3ded5b3d7eba5855a935ffd0b8e9db56N.exe.exe windows:5 windows x86 arch:x86
43fa417d6163576baf9c22a2bbfa27bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
EnumSystemLocalesA
GetLocaleInfoA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
WideCharToMultiByte
IsDebuggerPresent
MultiByteToWideChar
lstrlenA
LoadLibraryW
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
EncodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
HeapFree
HeapAlloc
GetProcessHeap
VirtualQuery
SetFilePointer
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
FatalAppExitA
SetConsoleCtrlHandler
InterlockedExchange
GetLocaleInfoW
RtlUnwind
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
HeapReAlloc
HeapSize
CreateFileW
CloseHandle
FlushFileBuffers
GetUserDefaultLCID
IsValidLocale
user32
wsprintfA
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ