C:\minotabac\guzolatemizam46\votiketipu_gex-tefugosa\87\ripolirakot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f6dbbdebe3b9e22d4ca07158b4c0a6b4b840593afeb6392f9942c27d66d8a9ff.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f6dbbdebe3b9e22d4ca07158b4c0a6b4b840593afeb6392f9942c27d66d8a9ff.exe
Resource
win10v2004-20241007-en
General
-
Target
f6dbbdebe3b9e22d4ca07158b4c0a6b4b840593afeb6392f9942c27d66d8a9ff
-
Size
324KB
-
MD5
ae116a7b24b9a47f81c09b9c7ed1bfae
-
SHA1
9a02723281cb8bb32746aa726f267e505262ed08
-
SHA256
f6dbbdebe3b9e22d4ca07158b4c0a6b4b840593afeb6392f9942c27d66d8a9ff
-
SHA512
ef3dece063cf2e0ff8b9778968869c885b4ad852b212c5b5f4eed054f636b3a2a73a3db5da87e34d9823055071a5f8657fb42117cc6aeeba3b0870d5c7ba96f5
-
SSDEEP
6144:ErYOO97dAJI9FNbZ+A7shI3qkuAa6SKtR:8tO9CJI9FNbZ+A7sI3qEa6SI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f6dbbdebe3b9e22d4ca07158b4c0a6b4b840593afeb6392f9942c27d66d8a9ff
Files
-
f6dbbdebe3b9e22d4ca07158b4c0a6b4b840593afeb6392f9942c27d66d8a9ff.exe windows:5 windows x86 arch:x86
02ee6c54d3ab44fde3432ebbac068962
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstVolumeW
WaitForSingleObject
GetNamedPipeHandleStateA
CreateNamedPipeW
CallNamedPipeW
TerminateThread
FatalExit
GetVersionExA
CopyFileExW
SetConsoleCP
VerifyVersionInfoA
VerLanguageNameA
FindFirstFileExW
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointA
GetLongPathNameW
CopyFileA
TlsSetValue
VerifyVersionInfoW
GetConsoleCursorInfo
TzSpecificLocalTimeToSystemTime
GetProcessShutdownParameters
ReleaseSemaphore
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
GlobalAlloc
Sleep
TlsGetValue
MoveFileW
GetCommandLineW
InterlockedExchange
DeleteFileA
CreateActCtxW
SetFileAttributesA
GetPrivateProfileIntW
HeapValidate
GetProcessHeap
CreateNamedPipeA
WriteConsoleOutputW
GetStartupInfoA
GetDiskFreeSpaceExW
GetCPInfoExW
GetWindowsDirectoryA
GetSystemWow64DirectoryA
SetLastError
GetProfileStringW
GetCalendarInfoA
GetTickCount
GetExitCodeThread
DebugBreak
ReadFileScatter
ReadFile
SetDefaultCommConfigA
GetNumberOfConsoleMouseButtons
GlobalWire
GetSystemWow64DirectoryW
WriteProfileStringA
lstrcatW
FindCloseChangeNotification
CreateActCtxA
InterlockedPopEntrySList
OutputDebugStringW
DefineDosDeviceA
LoadLibraryA
WriteConsoleW
InterlockedDecrement
SetSystemTimeAdjustment
GetConsoleMode
SetErrorMode
UnregisterWaitEx
PeekConsoleInputA
GetNumberFormatW
GetQueuedCompletionStatus
FindResourceExA
FindNextFileW
FindFirstFileA
FreeEnvironmentStringsA
SetLocalTime
EnumTimeFormatsW
CreateSemaphoreW
HeapSetInformation
SetFileShortNameA
lstrcpyA
HeapWalk
ReplaceFileA
SetSystemTime
LockFile
EnumCalendarInfoExW
MoveFileExW
GetConsoleCP
GetVolumePathNameW
SetConsoleScreenBufferSize
SearchPathW
FreeConsole
GetAtomNameW
GetConsoleAliasExesLengthW
WriteConsoleInputW
LocalLock
EnumDateFormatsA
SetCommState
GetSystemTimeAdjustment
EnumSystemLocalesW
GetNumaHighestNodeNumber
SetEndOfFile
ChangeTimerQueueTimer
GetWriteWatch
OpenSemaphoreW
GetLargestConsoleWindowSize
RaiseException
ClearCommError
ReleaseActCtx
GetComputerNameW
GetLastError
OpenMutexW
GetStringTypeA
SetSystemPowerState
VirtualUnlock
SetWaitableTimer
EnumResourceNamesW
CreateTimerQueueTimer
GetProcessTimes
UnregisterWait
IsBadWritePtr
GetCurrentProcessId
FatalAppExitA
GetFileAttributesA
lstrcpynW
DisconnectNamedPipe
FillConsoleOutputCharacterW
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringW
LockFileEx
LeaveCriticalSection
SetCurrentDirectoryA
GlobalAddAtomW
ReadFileEx
CloseHandle
CreateFileW
SetStdHandle
EncodePointer
DecodePointer
GetStartupInfoW
IsProcessorFeaturePresent
TlsAlloc
GetCurrentThreadId
TlsFree
GetModuleHandleW
InterlockedIncrement
ExitProcess
IsBadReadPtr
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
WriteFile
GetStdHandle
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
RtlUnwind
LoadLibraryW
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
OutputDebugStringA
SetFilePointer
FlushFileBuffers
user32
GetComboBoxInfo
GetAltTabInfoA
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 558KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ