C:\homuyodejuj37 m.pdb
Static task
static1
Behavioral task
behavioral1
Sample
79dc17855e41c95a144280cff99422932721209dd97cd28dcd985746e339397c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79dc17855e41c95a144280cff99422932721209dd97cd28dcd985746e339397c.exe
Resource
win10v2004-20241007-en
General
-
Target
c274ef57f23421357908adc54e8fa08fcae3757a74b572345719f6e4c9bf8270
-
Size
122KB
-
MD5
924c9f9449f9d6743be0943a1d8d3aa7
-
SHA1
5b301a65c433064e9ee0bfbf742ed73052b83be9
-
SHA256
c274ef57f23421357908adc54e8fa08fcae3757a74b572345719f6e4c9bf8270
-
SHA512
52eacf2905a699a0c2b3e1e0bae15ab603a9e828e61714fdb4aac03647841b4bd9530b67440a8bb312adcbe459a35404d53e0c3f051292d57e58cc50f5bd9bc1
-
SSDEEP
3072:Q023NQbgjXdR4jkltyI3qWo19+tVEpzgmtP4cj/An:H23NnjNi9mo1EXEdgmtP4cj/An
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/79dc17855e41c95a144280cff99422932721209dd97cd28dcd985746e339397c.exe
Files
-
c274ef57f23421357908adc54e8fa08fcae3757a74b572345719f6e4c9bf8270.zip
Password: infected
-
79dc17855e41c95a144280cff99422932721209dd97cd28dcd985746e339397c.exe.exe windows:5 windows x86 arch:x86
5dbcbed365563713c1a9bb2780528a54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
GetLocaleInfoA
LoadResource
HeapAlloc
InterlockedDecrement
GetEnvironmentStringsW
WaitForSingleObject
AddConsoleAliasW
SetEvent
GetEnvironmentStrings
ReadFileScatter
LeaveCriticalSection
GetFileAttributesA
FindNextVolumeW
CreateActCtxA
GetDevicePowerState
GetProcAddress
FreeUserPhysicalPages
VerLanguageNameW
WriteConsoleA
GetProcessId
LocalAlloc
RemoveDirectoryW
EnumResourceTypesW
GetModuleFileNameA
GetModuleHandleA
EraseTape
ReleaseMutex
EndUpdateResourceA
LocalSize
FindFirstVolumeW
FindNextVolumeA
lstrcpyW
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
SetHandleCount
GetFileType
GetLastError
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
CreateFileA
user32
SetCursorPos
Exports
Exports
@SetViceVariants@12
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ