C:\cefikiv\t.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a5e649c834f91bd5a2a5e776350fa0de963ca30bab4436aa4dbe0d56364aa832.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a5e649c834f91bd5a2a5e776350fa0de963ca30bab4436aa4dbe0d56364aa832.exe
Resource
win10v2004-20241007-en
General
-
Target
c34e084c40055a1d2dae3db279fc74b363d4d3d812d62f58aa40f932f5e3aea5
-
Size
136KB
-
MD5
a7ec69473bff1f04cff4352b1d17ed50
-
SHA1
43ec40ed624835a097a3fa056d290e6f58d32399
-
SHA256
c34e084c40055a1d2dae3db279fc74b363d4d3d812d62f58aa40f932f5e3aea5
-
SHA512
cce362e73149b9c5a6eab100c3f50f595d09a247c5fca81f1dd6a8328f586685a678ebbe14cde2e997858daaeb097f926a7e7c1ae3b847d14a48bde5b0bb0271
-
SSDEEP
3072:oEMdhrc/10/7hsAuGCif4M0jVS+VV8QrHLXezmXu14I:o7dhz/FsADfwjvP8mHzezL14I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a5e649c834f91bd5a2a5e776350fa0de963ca30bab4436aa4dbe0d56364aa832
Files
-
c34e084c40055a1d2dae3db279fc74b363d4d3d812d62f58aa40f932f5e3aea5.zip
-
a5e649c834f91bd5a2a5e776350fa0de963ca30bab4436aa4dbe0d56364aa832.exe windows:5 windows x86 arch:x86
96b8e95bde82173636a1396efb3d2ce2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringW
InterlockedDecrement
_lwrite
SetWaitableTimer
WaitNamedPipeA
BuildCommDCBW
GetConsoleAliasExesLengthA
PeekConsoleInputA
CreateFileW
FindNextFileW
EnumResourceTypesA
GetCPInfoExA
GetFirmwareEnvironmentVariableA
GetModuleFileNameA
BeginUpdateResourceA
GetConsoleAliasExesLengthW
DeleteFileW
WriteConsoleA
FillConsoleOutputCharacterW
WriteConsoleOutputCharacterW
LocalAlloc
GetProcAddress
GetModuleHandleW
GetSystemDefaultLangID
GetConsoleAliasA
FindNextChangeNotification
LocalReAlloc
RemoveDirectoryA
lstrcpynW
FindFirstFileExW
GetVolumeInformationW
GetCurrentDirectoryA
GetConsoleAliasesLengthW
SetConsoleTitleW
GetConsoleProcessList
OpenJobObjectA
_lopen
GetFileAttributesExW
SetComputerNameW
GetDiskFreeSpaceA
GetProcessHeap
SetEndOfFile
RaiseException
RtlUnwind
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
ReadFile
InitializeCriticalSectionAndSpinCount
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
LoadLibraryW
LCMapStringW
GetStringTypeW
SetFilePointer
SetStdHandle
CloseHandle
CreateFileA
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleW
user32
ScreenToClient
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 450KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ