C:\yip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6678c2d205b2e90dda05eb1ee4fcd01d0a9d2b56545f039ee0159e9e764eb741.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6678c2d205b2e90dda05eb1ee4fcd01d0a9d2b56545f039ee0159e9e764eb741.exe
Resource
win10v2004-20241007-en
General
-
Target
bdd1610b15ae3356b400ebe13166ba750a35418a09f03ed236d1cbbf2f66e3a4
-
Size
253KB
-
MD5
546685ea5b5da6c3a0ff72e637726d1f
-
SHA1
2caf13db9c3b78de6515a345ec20a5ce8faf926f
-
SHA256
bdd1610b15ae3356b400ebe13166ba750a35418a09f03ed236d1cbbf2f66e3a4
-
SHA512
1b9625f7235684d15bb9fc7162ce84bfacf33597ada1448185eb85312711e5acbc636acb87b9352490f11afdbe7f9e2a628f3597c9877e0fcd6e02a265abf8e0
-
SSDEEP
6144:Fot9guKOWLIfkFVgC0Sm3tbHsIWd+dCaTZk:Fw4O9CV4dtbMNd+dCb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/6678c2d205b2e90dda05eb1ee4fcd01d0a9d2b56545f039ee0159e9e764eb741
Files
-
bdd1610b15ae3356b400ebe13166ba750a35418a09f03ed236d1cbbf2f66e3a4.zip
-
6678c2d205b2e90dda05eb1ee4fcd01d0a9d2b56545f039ee0159e9e764eb741.exe windows:5 windows x86 arch:x86
162bfa83d7bc4555a077d42813a965ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetDefaultCommConfigA
SetPriorityClass
FindFirstChangeNotificationW
WritePrivateProfileStructA
GetConsoleAliasesLengthW
CopyFileExW
GetConsoleAliasExesA
GetStringTypeA
GetDriveTypeW
DebugActiveProcessStop
lstrcpynA
BuildCommDCBAndTimeoutsA
SetDllDirectoryW
EndUpdateResourceW
InterlockedIncrement
_lwrite
MoveFileExW
InterlockedDecrement
GetCurrentActCtx
GetSystemWindowsDirectoryW
GetModuleHandleExW
SetConsoleScreenBufferSize
WriteConsoleInputA
CallNamedPipeW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
FindNextVolumeMountPointA
GetConsoleTitleA
GetCompressedFileSizeW
ReadConsoleOutputA
GetDateFormatA
FindActCtxSectionStringA
TzSpecificLocalTimeToSystemTime
EnumResourceTypesA
GetPrivateProfileIntA
AddRefActCtx
LoadLibraryW
TerminateThread
ReadProcessMemory
GetSystemWow64DirectoryW
SetSystemTimeAdjustment
SetVolumeMountPointA
GetConsoleAliasExesLengthW
FormatMessageW
GetFileAttributesA
GetExitCodeProcess
GetNamedPipeInfo
FindNextVolumeW
GetConsoleAliasW
GetWriteWatch
GetFileAttributesW
VerifyVersionInfoA
GetBinaryTypeA
GetAtomNameW
GetMailslotInfo
GetCompressedFileSizeA
GetSystemDirectoryA
GetTimeZoneInformation
SetComputerNameExW
CreateActCtxA
GetFileSize
GetACP
GetVolumePathNameA
lstrlenW
SetThreadPriority
GetNamedPipeHandleStateW
GetConsoleAliasesW
GlobalUnfix
ReleaseActCtx
GetStartupInfoA
FillConsoleOutputCharacterW
GetLastError
GetProcessHeaps
DefineDosDeviceW
CreateNamedPipeA
EnumDateFormatsExA
HeapUnlock
CopyFileA
SetComputerNameA
EnterCriticalSection
GlobalGetAtomNameA
DisableThreadLibraryCalls
BuildCommDCBW
ResetEvent
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
WriteConsoleA
ProcessIdToSessionId
RegisterWaitForSingleObject
InterlockedExchangeAdd
LocalAlloc
GetFileType
WritePrivateProfileStringA
MoveFileA
SetCurrentDirectoryW
FindAtomA
SetSystemTime
GlobalWire
CreateIoCompletionPort
FindFirstChangeNotificationA
CreateWaitableTimerW
FindNextFileW
CreateMailslotA
GetStringTypeW
WriteProfileStringW
VirtualProtect
EnumDateFormatsW
WaitForDebugEvent
SetCalendarInfoA
SetThreadAffinityMask
SetProcessShutdownParameters
Module32NextW
GetVersionExA
ReadConsoleInputW
TerminateJobObject
CloseHandle
GetCurrentProcessId
GetFileInformationByHandle
EnumSystemLocalesW
CopyFileExA
CreateFileA
GetOverlappedResult
GetThreadContext
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
SetStdHandle
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetOEMCP
GetCPInfo
IsValidCodePage
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
SetHandleCount
GetStdHandle
QueryPerformanceCounter
GetSystemTimeAsFileTime
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetConsoleOutputCP
GetLocaleInfoA
LCMapStringA
LCMapStringW
DeleteFileA
advapi32
ImpersonateSelf
IsTokenUntrusted
Sections
.text Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 170KB - Virtual size: 421KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ