C:\rovegirece-y.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d39fdf80785be4b06809825a56b59ab494323fe1b2da317f5b2cfd0b6c1605d6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d39fdf80785be4b06809825a56b59ab494323fe1b2da317f5b2cfd0b6c1605d6.exe
Resource
win10v2004-20241007-en
General
-
Target
ff9d806a6080f61553c14042baf5685dcdc73ef6cb74288d822125a9a30d6778
-
Size
125KB
-
MD5
ce4ecddeb0c10ee4d9360c577a2fddf4
-
SHA1
06432788f45007656efed01c6ddc3a95bf7de549
-
SHA256
ff9d806a6080f61553c14042baf5685dcdc73ef6cb74288d822125a9a30d6778
-
SHA512
51243d6b5949016a82195ed23e5e8ea483cdada01c0c2fe11434c1d5c061cfc09b47a73098f14295396ab536bb4451c1147b6d89635794d3b18c3c7ea1231aa7
-
SSDEEP
3072:uAVsZHuZB/hJ0wE6TLH4ILMgLfNjA48Ud5TxcXx:3sVKRn9EUHtXfCEXCXx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/d39fdf80785be4b06809825a56b59ab494323fe1b2da317f5b2cfd0b6c1605d6
Files
-
ff9d806a6080f61553c14042baf5685dcdc73ef6cb74288d822125a9a30d6778.zip
-
d39fdf80785be4b06809825a56b59ab494323fe1b2da317f5b2cfd0b6c1605d6.exe windows:5 windows x86 arch:x86
21321f2f4a13cc319416648570b3eadf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenWaitableTimerA
WaitNamedPipeA
CommConfigDialogA
SetSystemTimeAdjustment
SearchPathA
EnumResourceTypesA
DeleteFileW
GetConsoleAliasesLengthW
FillConsoleOutputCharacterA
WriteConsoleOutputCharacterW
LocalAlloc
GetProcAddress
VirtualAlloc
LoadLibraryW
ReleaseActCtx
GetConsoleAliasA
FindFirstChangeNotificationW
WritePrivateProfileStringA
EnumResourceNamesW
GetModuleHandleA
lstrcpynA
AddAtomA
GenerateConsoleCtrlEvent
GetLastError
GetSystemDefaultLCID
GetSystemDefaultLangID
FindNextFileW
GetPriorityClass
SetConsoleCursorInfo
OpenJobObjectW
InitializeCriticalSection
FindResourceExA
GetConsoleMode
_hwrite
GlobalWire
GetComputerNameW
VerifyVersionInfoA
GetStringTypeA
FillConsoleOutputCharacterW
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
GetFileAttributesExA
SetComputerNameW
GetFileAttributesA
ReadConsoleA
GetVolumePathNameA
FoldStringA
UnlockFileEx
CreateFileA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
RaiseException
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
RtlUnwind
SetFilePointer
ReadFile
SetStdHandle
GetConsoleCP
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
ScreenToClient
gdi32
GetCharWidth32A
GetFontLanguageInfo
msimg32
AlphaBlend
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ