C:\lopoju\mo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c99bac2b46d96ff7b96dfb78c9e2c5d9c738761f76423530ab342467a4b91764.exe
Resource
win7-20240708-en
General
-
Target
c99bac2b46d96ff7b96dfb78c9e2c5d9c738761f76423530ab342467a4b91764
-
Size
405KB
-
MD5
6ca035971998f3667fa743ed99cf1425
-
SHA1
c6ced364d35ecc54c21ac105a4306d015829b9eb
-
SHA256
c99bac2b46d96ff7b96dfb78c9e2c5d9c738761f76423530ab342467a4b91764
-
SHA512
89a36939889bcb3cb47714433fc5a1a8b8873e4ee6ca32ccede21b10bdcc04fc620ac11a4c558690ac6d85f0216600148eb64a3f47b12eabf84751d87bc0e562
-
SSDEEP
6144:3ocFRtgS3H7rJM5YotHYBcI5OyXfsfvgbIhDmCwxJrtCWaFACTEEWRroQ563mL:3oczewH7I5J7KA3hDGrAWaF7RWRwW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c99bac2b46d96ff7b96dfb78c9e2c5d9c738761f76423530ab342467a4b91764
Files
-
c99bac2b46d96ff7b96dfb78c9e2c5d9c738761f76423530ab342467a4b91764.exe windows:5 windows x86 arch:x86
7d703f3dcc20ca3d782d2ebcd1926d70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLangID
ExitProcess
GetConsoleAliasesLengthW
GetCPInfo
InterlockedDecrement
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
SetFileTime
CreateActCtxW
GlobalAlloc
GetConsoleMode
TerminateThread
GetVersionExW
IsBadWritePtr
FileTimeToSystemTime
LocalHandle
GetEnvironmentVariableA
CompareStringW
lstrlenW
GetStartupInfoA
FindFirstFileExA
GetCurrentDirectoryW
SetLastError
GetProcAddress
GetLongPathNameA
WriteProfileSectionA
CopyFileA
GlobalGetAtomNameA
SearchPathA
ProcessIdToSessionId
OpenWaitableTimerW
MoveFileA
SetCurrentDirectoryW
WriteProfileSectionW
GetModuleFileNameA
GetModuleHandleA
FreeEnvironmentStringsW
CompareStringA
OutputDebugStringA
SetProcessShutdownParameters
SetFileShortNameA
GetVersionExA
TlsAlloc
GetWindowsDirectoryW
DeleteFileW
AddConsoleAliasA
LocalFileTimeToFileTime
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedIncrement
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsSetValue
TlsFree
GetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
WideCharToMultiByte
GetConsoleCP
InitializeCriticalSectionAndSpinCount
DebugBreak
WriteConsoleW
OutputDebugStringW
LoadLibraryW
RtlUnwind
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
Sections
.text Size: 302KB - Virtual size: 302KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 41.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ