C:\sanahon2 puvevix71 mu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b2259d7d5ddf3a60edaa2c0029bef3d639278866a8e0871cd9aa2cf6c7e8885f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b2259d7d5ddf3a60edaa2c0029bef3d639278866a8e0871cd9aa2cf6c7e8885f.exe
Resource
win10v2004-20241007-en
General
-
Target
eacc00aeed09ec04d2d345242a9b2049cf7c434f8bb82bb9e2ab52ec699db495
-
Size
139KB
-
MD5
9eb06fe5a8f86e2e5982da1aaaea2738
-
SHA1
2afb058fe3d98df96ce2b5481fd302fb33c1a1fe
-
SHA256
eacc00aeed09ec04d2d345242a9b2049cf7c434f8bb82bb9e2ab52ec699db495
-
SHA512
74ebb3e86b1464681e30282434a29f1d5e8e61a563d6a2c72262abee13168001f65cbb10cabe23aefe2f979e1f621b7449b3b6bcaf6d4bf3fbbb2c35a2f8ac0d
-
SSDEEP
3072:RORQ2xh8f5GrLNlI4toZ3EWTCy3aO8WWHK:RyQ2xi5CJ/oZ3E+LJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b2259d7d5ddf3a60edaa2c0029bef3d639278866a8e0871cd9aa2cf6c7e8885f.exe
Files
-
eacc00aeed09ec04d2d345242a9b2049cf7c434f8bb82bb9e2ab52ec699db495.zip
Password: infected
-
b2259d7d5ddf3a60edaa2c0029bef3d639278866a8e0871cd9aa2cf6c7e8885f.exe.exe windows:5 windows x86 arch:x86
4453019f24fbdf41dd3a4f06fe73134e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
OpenJobObjectA
CreateJobObjectW
QueryDosDeviceA
GetProcessPriorityBoost
GetModuleHandleW
EscapeCommFunction
GetNumberFormatA
GetWindowsDirectoryA
Sleep
GetStringTypeExW
GlobalFlags
GetFileAttributesW
GetThreadPriorityBoost
GetBinaryTypeW
FindNextVolumeMountPointW
GetConsoleAliasesW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
GetModuleHandleExA
WriteProfileSectionA
LoadLibraryA
CreateSemaphoreW
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
GetOEMCP
GetModuleHandleA
FreeEnvironmentStringsW
GetStringTypeW
EnumDateFormatsW
EndUpdateResourceA
GetVersionExA
FindAtomW
GetWindowsDirectoryW
CloseHandle
CreateFileA
RaiseException
WriteConsoleW
GetConsoleOutputCP
LocalUnlock
HeapFree
ExitProcess
GetStartupInfoW
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
HeapReAlloc
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
IsValidCodePage
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
user32
LoadIconA
CopyAcceleratorTableA
LoadMenuW
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
SetCaretPos
GetCaretBlinkTime
advapi32
ReportEventW
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 91KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ