C:\xutawo\sumenafarapeg\guvidaga\pukolaf\jed-cagesumesove.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3826bb2519e4cd674d6bcaea8407b8e4663742852fab1670457aca68ecaf5b16.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
3826bb2519e4cd674d6bcaea8407b8e4663742852fab1670457aca68ecaf5b16.exe
Resource
win10v2004-20241007-en
General
-
Target
56de19d77148be736be4d18f7c99e8a7e3a11371298497f9dd62e055d1aa7938
-
Size
250KB
-
MD5
5f6533f60017ae1ace1e9370daa0b8aa
-
SHA1
9bb7fd4db0d97d9aad79c42a353241f561b7c9bf
-
SHA256
56de19d77148be736be4d18f7c99e8a7e3a11371298497f9dd62e055d1aa7938
-
SHA512
2cefd34fbc9df66ace0906f34f683e2c83f2c98fe74a96d134816f159ddae5b81b9376e8c4f93168fdc8b8429d9fcd673f33ba5461c493d02e75008dd52995b0
-
SSDEEP
6144:Qnk9uKkNLXiaYXmKLV8BCuO25XZvDZKesQIGiXk:QnyubLyaYWUaBC9IXF1LiXk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/3826bb2519e4cd674d6bcaea8407b8e4663742852fab1670457aca68ecaf5b16
Files
-
56de19d77148be736be4d18f7c99e8a7e3a11371298497f9dd62e055d1aa7938.zip
Password: infected
-
3826bb2519e4cd674d6bcaea8407b8e4663742852fab1670457aca68ecaf5b16.exe windows:5 windows x86 arch:x86
fc447b22a7c46cfc167f33c086bb3b54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetCriticalSectionSpinCount
SearchPathW
SetInformationJobObject
lstrcmpA
FindFirstFileW
EnumCalendarInfoA
WriteConsoleInputW
IsBadStringPtrW
EnumDateFormatsExW
CopyFileExW
GetNumaProcessorNode
TlsGetValue
SetLocalTime
UnmapViewOfFile
MoveFileExA
CommConfigDialogA
GetNumberOfConsoleInputEvents
GetConsoleAliasExesLengthA
SetErrorMode
FindResourceW
BuildCommDCBAndTimeoutsA
FreeLibrary
SetUnhandledExceptionFilter
LoadLibraryExW
SetDllDirectoryW
InterlockedIncrement
GetQueuedCompletionStatus
VerSetConditionMask
MoveFileExW
ReadConsoleA
InterlockedDecrement
WaitNamedPipeA
SetMailslotInfo
WritePrivateProfileSectionA
SetDefaultCommConfigW
SetFirmwareEnvironmentVariableA
GetSystemWindowsDirectoryW
CreateJobObjectW
GlobalLock
AddConsoleAliasW
SetVolumeMountPointW
GetComputerNameW
OpenSemaphoreA
CreateHardLinkA
GetFileAttributesExA
_lclose
GetModuleHandleW
GetTickCount
GetCommConfig
GetProcessHeap
IsBadReadPtr
GetConsoleAliasesLengthA
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GetConsoleTitleA
CreateRemoteThread
GetCompressedFileSizeW
EnumTimeFormatsA
GetSystemWow64DirectoryA
SetCommTimeouts
CreateActCtxW
WaitForMultipleObjectsEx
InitializeCriticalSection
GetProcessTimes
TlsSetValue
AllocateUserPhysicalPages
OpenProcess
FindResourceExA
GetConsoleMode
FatalAppExitW
GetThreadSelectorEntry
GetCalendarInfoA
ReadFileScatter
SetSystemTimeAdjustment
ReadConsoleOutputW
SetConsoleCP
DeleteVolumeMountPointW
InterlockedPopEntrySList
GetFileAttributesA
lstrcpynW
GetNamedPipeInfo
HeapValidate
GetVolumePathNamesForVolumeNameW
CreateSemaphoreA
SetConsoleCursorPosition
VerifyVersionInfoA
HeapQueryInformation
TerminateProcess
GetAtomNameW
FileTimeToSystemTime
IsDBCSLeadByte
GetModuleFileNameW
lstrcatA
GetBinaryTypeW
GetNumaNodeProcessorMask
ExitThread
GetVolumePathNameA
lstrlenW
WritePrivateProfileStringW
GlobalUnlock
VirtualUnlock
GetTempPathW
GetStringTypeExA
GetNamedPipeHandleStateW
GetLargestConsoleWindowSize
GetPrivateProfileIntW
VerifyVersionInfoW
InterlockedExchange
ReleaseActCtx
SetCurrentDirectoryA
GetStdHandle
FindFirstFileA
GetLastError
ChangeTimerQueueTimer
BackupRead
BindIoCompletionCallback
GetProcAddress
GetLongPathNameA
VirtualAlloc
HeapSize
CreateNamedPipeA
CreateJobSet
LocalLock
LockFileEx
EnterCriticalSection
VerLanguageNameW
BuildCommDCBW
FindClose
GetPrivateProfileStringA
LoadLibraryA
Process32FirstW
OpenMutexA
ProcessIdToSessionId
LocalAlloc
MoveFileA
GetExitCodeThread
GetNumberFormatW
SetFileApisToANSI
QueryDosDeviceW
HeapWalk
GetPrivateProfileStructA
GetTapeParameters
SetEnvironmentVariableA
GetVolumePathNamesForVolumeNameA
GetModuleFileNameA
GetDefaultCommConfigA
WriteProfileStringA
WTSGetActiveConsoleSessionId
EnumDateFormatsA
WaitCommEvent
FindFirstChangeNotificationA
GetProcessShutdownParameters
QueueUserWorkItem
ContinueDebugEvent
IsDebuggerPresent
FatalExit
FreeEnvironmentStringsW
EnumResourceNamesA
FindNextFileW
WriteProfileStringW
EnumDateFormatsW
FatalAppExitA
PeekConsoleInputA
DeleteCriticalSection
WriteConsoleOutputAttribute
OutputDebugStringA
DuplicateHandle
FindFirstVolumeA
GetVersionExA
TlsAlloc
TerminateJobObject
CloseHandle
GetVersion
DeleteTimerQueueTimer
GlobalAddAtomW
GetPrivateProfileSectionW
SetFileValidData
FindActCtxSectionStringW
ResetWriteWatch
UnregisterWaitEx
ReadConsoleOutputCharacterW
TlsFree
GetProfileSectionW
EnumSystemLocalesW
lstrcpyW
CopyFileExA
CreateFileW
SetStdHandle
GetPrivateProfileSectionNamesW
UnregisterWait
GetThreadContext
CompareStringW
GetFullPathNameA
RaiseException
GetCommandLineW
HeapSetInformation
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
DecodePointer
ExitProcess
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
EncodePointer
SetLastError
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
LeaveCriticalSection
LoadLibraryW
GetCurrentProcess
UnhandledExceptionFilter
HeapAlloc
HeapReAlloc
HeapFree
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
WriteConsoleW
OutputDebugStringW
IsProcessorFeaturePresent
SetFilePointer
GetConsoleCP
FlushFileBuffers
user32
GetMessageTime
gdi32
GetBitmapBits
advapi32
InitiateSystemShutdownA
GetFileSecurityW
msimg32
AlphaBlend
Sections
.text Size: 302KB - Virtual size: 302KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 23.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ