C:\hil\31-hiy\rihanugu\vuruwewah-xukocureleh\vigojo\mipicegafek_g.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1338d926ad898d16855ca398db240621f0fe2eaabe16f93ac86ced80295ec0a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1338d926ad898d16855ca398db240621f0fe2eaabe16f93ac86ced80295ec0a1.exe
Resource
win10v2004-20241007-en
General
-
Target
f657ce20b49b97852351cefd0be5e71d
-
Size
137KB
-
MD5
f657ce20b49b97852351cefd0be5e71d
-
SHA1
d29529a31373bd7158328fe75df3808eeae1a8e8
-
SHA256
ec0c436444d77e6657310c5335f35132864b1c5b9287172c88b1be5f4833412b
-
SHA512
240db4dcb8ed2d8c8ff5008c0d11b5370952a8cbfa7e45ea393d470460f9925f3151301aa603a13b9a0c1b7ae40b755343bf9b16c356ac66d2300e990c5fe8b8
-
SSDEEP
3072:hX58nci6UkxoG4LO/7yhfT10OB47PlKivnOreHhO2mUDpj:gndRS76fRnB4DoivOreHx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/1338d926ad898d16855ca398db240621f0fe2eaabe16f93ac86ced80295ec0a1
Files
-
f657ce20b49b97852351cefd0be5e71d.zip
-
1338d926ad898d16855ca398db240621f0fe2eaabe16f93ac86ced80295ec0a1.exe windows:5 windows x86 arch:x86
f7bff042f521c52809460cf99f02aa1e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringW
InterlockedDecrement
_lwrite
SetWaitableTimer
WaitNamedPipeA
BuildCommDCBW
GetConsoleAliasExesLengthA
PeekConsoleInputA
CreateFileW
FindNextFileW
EnumResourceTypesA
GetCPInfoExA
GetFirmwareEnvironmentVariableA
GetModuleFileNameA
BeginUpdateResourceA
GetConsoleAliasExesLengthW
DeleteFileW
WriteConsoleA
FillConsoleOutputCharacterW
WriteConsoleOutputCharacterW
LocalAlloc
GetProcAddress
GetModuleHandleW
GetSystemDefaultLangID
GetConsoleAliasA
FindNextChangeNotification
LocalReAlloc
RemoveDirectoryA
lstrcpynW
FindFirstFileExW
GetVolumeInformationW
GetCurrentDirectoryA
GetConsoleAliasesLengthW
SetConsoleTitleW
GetThreadLocale
GetCurrentProcess
OpenJobObjectA
_lopen
GetFileAttributesExW
SetComputerNameW
GetProcessHeap
SetEndOfFile
RaiseException
RtlUnwind
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
ReadFile
InitializeCriticalSectionAndSpinCount
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
LoadLibraryW
LCMapStringW
GetStringTypeW
SetFilePointer
SetStdHandle
CloseHandle
CreateFileA
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleW
user32
ScreenToClient
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 74KB - Virtual size: 451KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ