C:\vetateboduvu\taziza\bek27 susaloh9.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ce2933b3ed09b57f4b18b334767d62bb8b7c5dd4423e8edebf4d5e4e9e72b954.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ce2933b3ed09b57f4b18b334767d62bb8b7c5dd4423e8edebf4d5e4e9e72b954.exe
Resource
win10v2004-20241007-en
General
-
Target
ce2933b3ed09b57f4b18b334767d62bb8b7c5dd4423e8edebf4d5e4e9e72b954
-
Size
171KB
-
MD5
51befbf4431f554e5def6691034e3bec
-
SHA1
2b920d1d118db00283cfc7299c6c1044b4214d87
-
SHA256
ce2933b3ed09b57f4b18b334767d62bb8b7c5dd4423e8edebf4d5e4e9e72b954
-
SHA512
399334589106806238dbbddf5a7a8774f31153462e155efd338147f1426dada4a8542fdcab70217700091cfcd5f6d86ea86454a85e76e425f3869ce0cd710163
-
SSDEEP
3072:vfjP8W/DiTBkHlOBkMV8k5ARIHo9FOxuWrxpzbgqrukVggjcGkNIVqI:XjR/DyaF8kMJNIbOkuzbgwuA7ITsq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce2933b3ed09b57f4b18b334767d62bb8b7c5dd4423e8edebf4d5e4e9e72b954
Files
-
ce2933b3ed09b57f4b18b334767d62bb8b7c5dd4423e8edebf4d5e4e9e72b954.exe windows:5 windows x86 arch:x86
18875662b19ade4ddd6bba43f9abb4a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EndUpdateResourceW
SetMailslotInfo
HeapFree
GetEnvironmentStringsW
SetConsoleScreenBufferSize
SetEvent
OpenSemaphoreA
GetTickCount
CreateActCtxW
Sleep
GetVersionExW
GetModuleFileNameW
GetCPInfoExW
GetProcAddress
VirtualAlloc
GetAtomNameA
LoadLibraryA
WriteConsoleA
LocalAlloc
TransmitCommChar
BeginUpdateResourceA
SetEnvironmentVariableA
SetConsoleTitleW
LoadLibraryExA
EraseTape
GetProcessAffinityMask
GetCPInfoExA
Module32Next
DeleteAtom
FindActCtxSectionStringW
FindNextVolumeA
LCMapStringW
lstrcpyA
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapAlloc
GetLastError
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
ReadFile
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
SetStdHandle
FlushFileBuffers
HeapSize
LoadLibraryW
WriteConsoleW
GetStringTypeW
HeapReAlloc
CreateFileW
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 42.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mor Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ