C:\nike46-teyeperugiladi\reguhamunebede j.pdb
Static task
static1
Behavioral task
behavioral1
Sample
05ca5bba0650cf01767621ce6c00b06d1c8caafa6f754bd63bbdc9dcfbd3da15.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05ca5bba0650cf01767621ce6c00b06d1c8caafa6f754bd63bbdc9dcfbd3da15.exe
Resource
win10v2004-20241007-en
General
-
Target
42a27d6f85819b1248912746c9048f48
-
Size
136KB
-
MD5
42a27d6f85819b1248912746c9048f48
-
SHA1
934622585b08732e7c8f51ab546d9d66cdc6f2ea
-
SHA256
902543a59a8e14d952e73913820d53ca9d1ae2b19481cf18083f90199298a15c
-
SHA512
8b45a1e10038fbb6cb92947654142984aab93bf91b6ba16ddbab9b9df0f42b47d7b809ea447b41eebc0632fcd533664ff1d5b040b3bdf387c5edd3f57929d0ea
-
SSDEEP
3072:fXKmoQj+pj2ELeNcGDWu2CTtLcroUQurUXs96QMnYKtYkZ:fXLj+N2ELeOcmN6skJakZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/05ca5bba0650cf01767621ce6c00b06d1c8caafa6f754bd63bbdc9dcfbd3da15
Files
-
42a27d6f85819b1248912746c9048f48.zip
-
05ca5bba0650cf01767621ce6c00b06d1c8caafa6f754bd63bbdc9dcfbd3da15.exe windows:5 windows x86 arch:x86
f7bff042f521c52809460cf99f02aa1e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringW
InterlockedDecrement
_lwrite
SetWaitableTimer
WaitNamedPipeA
BuildCommDCBW
GetConsoleAliasExesLengthA
PeekConsoleInputA
CreateFileW
FindNextFileW
EnumResourceTypesA
GetCPInfoExA
GetFirmwareEnvironmentVariableA
GetModuleFileNameA
BeginUpdateResourceA
GetConsoleAliasExesLengthW
DeleteFileW
WriteConsoleA
FillConsoleOutputCharacterW
WriteConsoleOutputCharacterW
LocalAlloc
GetProcAddress
GetModuleHandleW
GetSystemDefaultLangID
GetConsoleAliasA
FindNextChangeNotification
LocalReAlloc
RemoveDirectoryA
lstrcpynW
FindFirstFileExW
GetVolumeInformationW
GetCurrentDirectoryA
GetConsoleAliasesLengthW
SetConsoleTitleW
GetThreadLocale
GetCurrentProcess
OpenJobObjectA
_lopen
GetFileAttributesExW
SetComputerNameW
GetProcessHeap
SetEndOfFile
RaiseException
RtlUnwind
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
ReadFile
InitializeCriticalSectionAndSpinCount
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
LoadLibraryW
LCMapStringW
GetStringTypeW
SetFilePointer
SetStdHandle
CloseHandle
CreateFileA
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleW
user32
ScreenToClient
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 451KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ