E:\gpProRia\EshwdRDb\jZmpdlg.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe
Resource
win10v2004-20241007-en
General
-
Target
9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN
-
Size
326KB
-
MD5
5dc3523309ca2b02be4accac2c562140
-
SHA1
134ad5ff01e268d7065cc86e751b6bcb9dc0ec8a
-
SHA256
9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5e
-
SHA512
140d05724590d1329a614af34d47ef79bb8a2b310a03c7023f8263709a5eb8c8aa44ca588ff1421da3ef2bb46b9d795fa1904bca7fceb8ad3d115c87e9d07b8e
-
SSDEEP
6144:kYiOX3N7CXvWN3EujVMX+e36upoPGJdVd3Or20h9ULxv9i:kctLN3E6Ve+equCGJz1Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN
Files
-
9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe windows:5 windows x86 arch:x86
bbaa6c092061ffb5bd6bc6ac2f261cbc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
CreatePropertySheetPageA
ImageList_Draw
ImageList_Remove
gdi32
CreatePatternBrush
CreateHatchBrush
EnumFontFamiliesW
SaveDC
TextOutA
SetAbortProc
GetTextExtentPoint32W
ExcludeClipRect
user32
GetMenuItemRect
DispatchMessageA
GetDlgItemInt
SetWindowTextA
GetScrollInfo
GetWindowTextLengthW
GetKeyboardLayoutList
AllowSetForegroundWindow
UnionRect
MonitorFromPoint
wsprintfW
OpenInputDesktop
CharUpperBuffW
CharUpperW
kernel32
FormatMessageW
lstrlenW
SetupComm
CloseHandle
GetAtomNameW
FileTimeToLocalFileTime
SetFileApisToOEM
CreateNamedPipeA
TransactNamedPipe
GlobalFree
lstrcmpiW
GetLastError
FindNextChangeNotification
GetLocalTime
shlwapi
StrCatBuffW
StrCmpW
comdlg32
ReplaceTextW
GetOpenFileNameA
Exports
Exports
?bbbPfssaOzOAxaJmcm@@YGDPAH@Z
?zljrfARryJIcyfmySqqmf@@YGPAMPAJ@Z
?uinijvogybeg@@YGDPAIK@Z
?uollJxyOkZsOa@@YGPAEPAE@Z
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 481KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 282KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1024B - Virtual size: 726B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ