C:\lufukahune48\vego\menumeje.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
d91dc1d99dc2e79cc4fac2ab1a9a3d69626cb566b619998206154bf0d128bf64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d91dc1d99dc2e79cc4fac2ab1a9a3d69626cb566b619998206154bf0d128bf64.exe
Resource
win10v2004-20241007-en
General
-
Target
7d19781a1e0fdd709adee4d287efd36dfac7cd96194eec36af359d3691c52ab9
-
Size
148KB
-
MD5
ad2c8de74c7252faa040a4096c0c620e
-
SHA1
a574ca725250020869f22a699e6fb9ff3cee2eb1
-
SHA256
7d19781a1e0fdd709adee4d287efd36dfac7cd96194eec36af359d3691c52ab9
-
SHA512
c4d8da1378d62edd63375209bf3f79919b0c6faaa981a337133c52d66aaa5da258c80afd2d550267a7b04c9a174ce5b592aee61794fad0764a7229bb4786bab7
-
SSDEEP
3072:PU62I3fBCnX/vhGrKpzhL0699mvN52AVKbYPLT2RcTTteMxaIFHHFP3:c6reviKhhL79IvrE8LT6cTTteMxn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d91dc1d99dc2e79cc4fac2ab1a9a3d69626cb566b619998206154bf0d128bf64.exe
Files
-
7d19781a1e0fdd709adee4d287efd36dfac7cd96194eec36af359d3691c52ab9.zip
Password: infected
-
d91dc1d99dc2e79cc4fac2ab1a9a3d69626cb566b619998206154bf0d128bf64.exe.exe windows:5 windows x86 arch:x86
9876fb6c6727cbfad64dcef15fc811f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenJobObjectA
CreateJobObjectW
QueryDosDeviceA
GetProcessPriorityBoost
GetModuleHandleW
FindNextVolumeMountPointA
EscapeCommFunction
GetWindowsDirectoryA
Sleep
GetConsoleAliasExesLengthW
DeleteVolumeMountPointW
GetStringTypeExW
GetFileAttributesA
GlobalFlags
GetThreadPriorityBoost
GetBinaryTypeW
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
WriteProfileSectionA
EnterCriticalSection
MoveFileExW
CreateSemaphoreW
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
GetProfileStringA
GetOEMCP
EnumDateFormatsA
GetModuleHandleA
FreeEnvironmentStringsW
GetStringTypeW
SetFileShortNameA
EndUpdateResourceA
GetVersionExA
FindAtomW
GetWindowsDirectoryW
CloseHandle
CreateFileA
LoadLibraryA
GetModuleHandleExA
GetStringTypeA
HeapFree
ExitProcess
GetStartupInfoW
WideCharToMultiByte
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
HeapAlloc
HeapReAlloc
SetFilePointer
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
IsValidCodePage
RtlUnwind
SetStdHandle
FlushFileBuffers
HeapSize
GetLocaleInfoA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
user32
GetCaretBlinkTime
LoadIconA
CopyAcceleratorTableA
LoadMenuW
CharLowerBuffA
GetSysColorBrush
GetMenuInfo
SetCaretPos
advapi32
ReportEventW
winhttp
WinHttpSetOption
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ