C:\gazoyuri39\hehedazek\4.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2cd68fb90b9674875829727e74ff9ace0b39b7fca214532da2028e9b1c1f10ae.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cd68fb90b9674875829727e74ff9ace0b39b7fca214532da2028e9b1c1f10ae.exe
Resource
win10v2004-20241007-en
General
-
Target
50e4b91844875dc7c9644a7b3f3a412e4cef4f7675c5dea8016b160d1766cd32
-
Size
140KB
-
MD5
a54e2410ede6d7e2b5c09d71f82bce2a
-
SHA1
284fcca666ea40c49d6037b09c8cb5675c63e356
-
SHA256
50e4b91844875dc7c9644a7b3f3a412e4cef4f7675c5dea8016b160d1766cd32
-
SHA512
8b89b6f9b88da6dc76184ff2d811d42d04d6935dc2f5e84f7d0f514fe26766559481f94e1afb3ce683813175fb2d3e20f0252cae32a85bd4ed3ab56ddc973d73
-
SSDEEP
3072:1qqWFjUxm1Csu7M+RAXlkpJnA4lf5W3X4KkwkVAfFsdyc6PLwHSS:13WNH8MaAVkpJnA4lf5W3X9XkG2wiSS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2cd68fb90b9674875829727e74ff9ace0b39b7fca214532da2028e9b1c1f10ae.exe
Files
-
50e4b91844875dc7c9644a7b3f3a412e4cef4f7675c5dea8016b160d1766cd32.zip
Password: infected
-
2cd68fb90b9674875829727e74ff9ace0b39b7fca214532da2028e9b1c1f10ae.exe.exe windows:5 windows x86 arch:x86
4453019f24fbdf41dd3a4f06fe73134e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
OpenJobObjectA
CreateJobObjectW
QueryDosDeviceA
GetProcessPriorityBoost
GetModuleHandleW
EscapeCommFunction
GetNumberFormatA
GetWindowsDirectoryA
Sleep
GetStringTypeExW
GlobalFlags
GetFileAttributesW
GetThreadPriorityBoost
GetBinaryTypeW
FindNextVolumeMountPointW
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
GetModuleHandleExA
WriteProfileSectionA
LoadLibraryA
CreateSemaphoreW
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
GetOEMCP
GetModuleHandleA
FreeEnvironmentStringsW
GetStringTypeW
EnumDateFormatsW
EndUpdateResourceA
GetVersionExA
FindAtomW
GetWindowsDirectoryW
CloseHandle
CreateFileA
RaiseException
WriteConsoleW
GetConsoleOutputCP
LocalUnlock
HeapFree
ExitProcess
GetStartupInfoW
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
HeapReAlloc
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
IsValidCodePage
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
user32
LoadIconA
CopyAcceleratorTableA
LoadMenuW
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
SetCaretPos
GetCaretBlinkTime
advapi32
ReportEventW
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ