C:\xowur\83\ziz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
88d69c758f849c46b7123bfa762a99aec247de252cf7628e1242b55ac8d975e9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88d69c758f849c46b7123bfa762a99aec247de252cf7628e1242b55ac8d975e9.exe
Resource
win10v2004-20241007-en
General
-
Target
c7b987a36262b72c27d1e3282186f235
-
Size
158KB
-
MD5
c7b987a36262b72c27d1e3282186f235
-
SHA1
f6722992a55c8d7ab60986725b0d07204b14c4a3
-
SHA256
72f18e386968b0ca48342858c75063e824088f4128fc43e473b2001e669b9b67
-
SHA512
0435afccef0aa49495e59f313c46ca8beac735d3ef08ae643cfcc388954bc0e1559399f6189653d26235db8a16d525886882f424bf644d2c1981b9559030bd40
-
SSDEEP
3072:KiVt7zjL5SNzoVE3mkDz3P9eDB1RtS837OECvEAaCurPl0LT+5GsdGi+OZY81hVf:pz3YNUiNDz4l1+OaMAePlwKwAGiX281b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/88d69c758f849c46b7123bfa762a99aec247de252cf7628e1242b55ac8d975e9
Files
-
c7b987a36262b72c27d1e3282186f235.zip
-
88d69c758f849c46b7123bfa762a99aec247de252cf7628e1242b55ac8d975e9.exe windows:5 windows x86 arch:x86
48b3ffff55e9b2acd154a07eaa45a85b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLangID
GetConsoleAliasesLengthW
MoveFileExA
SetEndOfFile
InterlockedIncrement
WaitNamedPipeA
WriteConsoleInputA
SetComputerNameW
GetTickCount
GetGeoInfoW
GetConsoleAliasExesW
WriteFile
GetConsoleCP
GlobalAlloc
GetSystemDirectoryW
LoadLibraryW
Sleep
ReadConsoleInputA
AssignProcessToJobObject
GetFileAttributesA
EnumSystemCodePagesA
GetConsoleAliasW
GetFileAttributesW
WriteConsoleW
lstrlenW
LCMapStringA
GetLastError
GetProcAddress
VirtualAlloc
FreeUserPhysicalPages
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
CreateHardLinkW
AddAtomW
CreateEventW
WriteProfileSectionW
GetModuleHandleA
CreateMutexA
FindNextFileW
GetFileAttributesExW
LCMapStringW
HeapAlloc
GetModuleHandleW
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
GetStdHandle
GetModuleFileNameA
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
GetConsoleMode
MultiByteToWideChar
CloseHandle
CreateFileA
SetStdHandle
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetConsoleOutputCP
FlushFileBuffers
GetProcessHeap
ReadFile
RaiseException
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 131KB - Virtual size: 40.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ