C:\wes\guyalaj33\meh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
82b006ca48e7abf59cb59050eb286b8d7e14374637d11170a569a12a63de74f7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
82b006ca48e7abf59cb59050eb286b8d7e14374637d11170a569a12a63de74f7.exe
Resource
win10v2004-20241007-en
General
-
Target
6af1ef27a302b4b4a239e3ee6aa1516711a8b83f
-
Size
157KB
-
MD5
d98f12ad7f957d16c8e59baa3aa1349c
-
SHA1
6af1ef27a302b4b4a239e3ee6aa1516711a8b83f
-
SHA256
fbd7ee30cd1e9bbf7449844f40cf7488a0c14d8b08756933f3a4e20b1e168480
-
SHA512
1df56033228a1c3196ffa0c9d56cfb4bc547061bdd733c18de70e514ca111ad5b663f39f5e498181adc1d58337641a535ac88a41589dac3adc661023b6216d19
-
SSDEEP
3072:7agX+bwNtCOnKOEaKWHKSob0/mNCQGX8m65Vpnxfh+R6b9AwKV:CcNtCWxNoY/mNCQGXxC5xfO0Awy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/82b006ca48e7abf59cb59050eb286b8d7e14374637d11170a569a12a63de74f7
Files
-
6af1ef27a302b4b4a239e3ee6aa1516711a8b83f.zip
-
82b006ca48e7abf59cb59050eb286b8d7e14374637d11170a569a12a63de74f7.exe windows:5 windows x86 arch:x86
48b3ffff55e9b2acd154a07eaa45a85b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLangID
GetConsoleAliasesLengthW
MoveFileExA
SetEndOfFile
InterlockedIncrement
WaitNamedPipeA
WriteConsoleInputA
SetComputerNameW
GetTickCount
GetGeoInfoW
GetConsoleAliasExesW
WriteFile
GetConsoleCP
GlobalAlloc
GetSystemDirectoryW
LoadLibraryW
Sleep
ReadConsoleInputA
AssignProcessToJobObject
GetFileAttributesA
EnumSystemCodePagesA
GetConsoleAliasW
GetFileAttributesW
WriteConsoleW
lstrlenW
LCMapStringA
GetLastError
GetProcAddress
VirtualAlloc
FreeUserPhysicalPages
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
CreateHardLinkW
AddAtomW
CreateEventW
WriteProfileSectionW
GetModuleHandleA
CreateMutexA
FindNextFileW
GetFileAttributesExW
LCMapStringW
HeapAlloc
GetModuleHandleW
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
GetStdHandle
GetModuleFileNameA
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
GetConsoleMode
MultiByteToWideChar
CloseHandle
CreateFileA
SetStdHandle
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetConsoleOutputCP
FlushFileBuffers
GetProcessHeap
ReadFile
RaiseException
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 130KB - Virtual size: 40.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ