C:\bok\leluza.pdb
Static task
static1
Behavioral task
behavioral1
Sample
760eaa8737908a36b3530d765ccfa47e049abdb2f3d8a77f11eddeebdeabd60f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
760eaa8737908a36b3530d765ccfa47e049abdb2f3d8a77f11eddeebdeabd60f.exe
Resource
win10v2004-20241007-en
General
-
Target
14a07677c0415e1985bccd51338ecaa73c08b4be5173b543f53b600ea3409807
-
Size
201KB
-
MD5
c1d1f5b00cdaf0ea6626ea1dbe9e32c0
-
SHA1
382acef5e59882c4c97d3c88aad5484a8ec9003d
-
SHA256
14a07677c0415e1985bccd51338ecaa73c08b4be5173b543f53b600ea3409807
-
SHA512
80b4cf82c9987c4b5c2f07bb2e8ad2a11355aa84f4d6b27e22b531fa1f94ffbfab3abe732f8bcf9c54a49e96388772f361e1680a4e89dda9e9d2180282147b4a
-
SSDEEP
3072:22TyRq6bXC4GFi+dVq6LTry88TgHaNIyJEjHqKTQLqFJFdSLZMlHfdSwaiRKaidI:22TyA2XC9FZqO3yLQjGDHqdgZEHsbax
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/760eaa8737908a36b3530d765ccfa47e049abdb2f3d8a77f11eddeebdeabd60f.exe
Files
-
14a07677c0415e1985bccd51338ecaa73c08b4be5173b543f53b600ea3409807.zip
Password: infected
-
760eaa8737908a36b3530d765ccfa47e049abdb2f3d8a77f11eddeebdeabd60f.exe.exe windows:5 windows x86 arch:x86
78e7ee5100bfaf1fc91f03f913e814c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnregisterWait
IsBadStringPtrW
FindResourceExW
GlobalAddAtomA
EndUpdateResourceW
InterlockedIncrement
ReadConsoleA
GetConsoleAliasA
GetCurrentProcess
FreeEnvironmentStringsA
GetModuleHandleW
EnumCalendarInfoExW
GetProcessHeap
GetGeoInfoW
FindActCtxSectionStringA
WideCharToMultiByte
SetSystemTimeAdjustment
LeaveCriticalSection
GetFileAttributesA
FlushInstructionCache
GetProcAddress
VirtualAlloc
OpenWaitableTimerA
LoadLibraryA
DnsHostnameToComputerNameA
GetCommMask
SetCommMask
SetConsoleCursorInfo
lstrcmpiW
GetModuleHandleA
OpenFileMappingW
BuildCommDCBA
GetFileAttributesExW
GetConsoleSelectionInfo
LCMapStringW
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
TerminateProcess
IsDebuggerPresent
ExitProcess
GetStartupInfoW
GetCPInfo
RtlUnwind
RaiseException
LCMapStringA
GetStringTypeW
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
CreateFileA
user32
GetDC
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ