C:\gofatagajo3 payiceso7.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a71b161796d07394e22622bcab68843b2ab11d60300bcc9e95bfb1d357b1b504.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a71b161796d07394e22622bcab68843b2ab11d60300bcc9e95bfb1d357b1b504.exe
Resource
win10v2004-20241007-en
General
-
Target
0b95eed65584bec19b6329f7825473b28596d6d3095bf482d5ed4d57280b7c4e
-
Size
215KB
-
MD5
9b680fe6c94c5c5efd8d1ee47e6bc9a3
-
SHA1
07700e18220654e8334dd36db10c413543ab5f59
-
SHA256
0b95eed65584bec19b6329f7825473b28596d6d3095bf482d5ed4d57280b7c4e
-
SHA512
a43498c2da52783afa059ab4688503ee107442c9a409d0a70b36eef4f1864f7fe4bf019302bbd1371bceaa87158900b82d7a0af4fed862eebb656dc71b093416
-
SSDEEP
6144:i1kT+4D3AjcLAtXGXWOEiKqYeSSbCmNUVjL9TWJz5:QkXLAQL03/i3JbFa9iz5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/a71b161796d07394e22622bcab68843b2ab11d60300bcc9e95bfb1d357b1b504
Files
-
0b95eed65584bec19b6329f7825473b28596d6d3095bf482d5ed4d57280b7c4e.zip
-
a71b161796d07394e22622bcab68843b2ab11d60300bcc9e95bfb1d357b1b504.exe windows:5 windows x86 arch:x86
d5632d54ec7a430a4ccbd59048a8a61d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetProfileIntW
WaitNamedPipeA
CreateJobObjectW
GetSystemDefaultLCID
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
GetUserDefaultLangID
LoadLibraryW
GetCalendarInfoW
DeleteVolumeMountPointW
GetFileAttributesW
WriteConsoleW
SetThreadPriority
LCMapStringA
FillConsoleOutputCharacterW
TlsGetValue
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
SetFileAttributesA
LoadLibraryA
WriteConsoleA
LocalAlloc
SetProcessWorkingSetSize
OpenJobObjectW
FoldStringW
FindFirstChangeNotificationA
GetVolumeNameForVolumeMountPointW
GetFileInformationByHandle
AddConsoleAliasA
GetVolumeInformationW
GetFullPathNameA
GetLastError
GetComputerNameA
HeapAlloc
GetStartupInfoW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleOutputCP
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
RaiseException
GetModuleHandleA
GetLocaleInfoA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
ReadFile
advapi32
BackupEventLogW
ReportEventW
winhttp
WinHttpCheckPlatform
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ