C:\vogi56\muri\tagijobinihoc nefelehekilu\35\s.pdb
Static task
static1
Behavioral task
behavioral1
Sample
47c15b98b7a053e4588c90eb7cb5fff541547e00.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
47c15b98b7a053e4588c90eb7cb5fff541547e00.exe
Resource
win10v2004-20241007-en
General
-
Target
47c15b98b7a053e4588c90eb7cb5fff541547e00
-
Size
231KB
-
MD5
91eac464b6c8625057aaea931cb13eb8
-
SHA1
47c15b98b7a053e4588c90eb7cb5fff541547e00
-
SHA256
b44ee45405a4a0ecae0b5d0b7d637c31a8f549e425ce684c7e8f9f3f82b74011
-
SHA512
c8fcf308d7aee0b72fc35db3e91d228cb7ba5060d9c07c62782c982749eea05aa78e6d6e306f408d514af470e2540c1fd1669170858b9bdef0dac51f8ba9b7e2
-
SSDEEP
6144:bJeVJHKvJbW+2pubEILjDHIxkzIXOerwVfEz:bJeVJHs32MYIDjAf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 47c15b98b7a053e4588c90eb7cb5fff541547e00
Files
-
47c15b98b7a053e4588c90eb7cb5fff541547e00.exe windows:5 windows x86 arch:x86
f6a4fccad89238d45606175d43578099
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringA
InterlockedIncrement
_hread
CancelWaitableTimer
WaitNamedPipeA
BuildCommDCBA
GetConsoleAliasExesLengthW
PeekConsoleInputW
CreateFileA
RegisterWaitForSingleObject
LoadLibraryA
EnumResourceTypesW
TransmitCommChar
GetFirmwareEnvironmentVariableA
GetModuleFileNameW
BeginUpdateResourceA
WriteConsoleA
LoadLibraryW
WriteConsoleW
DeleteFileW
FillConsoleOutputCharacterW
GetProcAddress
GetSystemDefaultLCID
GetConsoleAliasW
FindFirstChangeNotificationA
LocalReAlloc
RemoveDirectoryW
lstrcpynW
FindFirstFileExA
AreFileApisANSI
GetCurrentDirectoryW
GetConsoleAliasesLengthW
SetConsoleTitleA
GetBinaryTypeA
GlobalAlloc
FindNextFileA
OpenJobObjectW
HeapFree
_lopen
GetComputerNameA
SetThreadLocale
GetCurrentProcess
TlsGetValue
TlsSetValue
GetCPInfoExW
GetFileAttributesExW
SetCalendarInfoW
SetComputerNameA
GetFileAttributesW
FoldStringW
GetDiskFreeSpaceW
CreateFileW
RtlUnwind
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
GetLastError
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
HeapAlloc
TlsAlloc
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
ExitProcess
CloseHandle
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
SetStdHandle
FlushFileBuffers
HeapReAlloc
MultiByteToWideChar
SetEndOfFile
GetProcessHeap
ReadFile
LCMapStringW
GetStringTypeW
HeapSize
user32
ScreenToClient
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 451KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ