C:\mizob.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7ec753ae1f7ae0ea346ec57ea0f2161c615e15d6d64a443cfa549ffe73aa2273.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7ec753ae1f7ae0ea346ec57ea0f2161c615e15d6d64a443cfa549ffe73aa2273.exe
Resource
win10v2004-20241007-en
General
-
Target
7ec753ae1f7ae0ea346ec57ea0f2161c615e15d6d64a443cfa549ffe73aa2273
-
Size
427KB
-
MD5
46cbf5e70be08b017f61a4e9cb29aa81
-
SHA1
eae5474a8f5f0a6189cac0e5c44112ec7d758414
-
SHA256
7ec753ae1f7ae0ea346ec57ea0f2161c615e15d6d64a443cfa549ffe73aa2273
-
SHA512
343cc9fc06960f4f31e0420d7b11dffaf74f8a569ef7b2d160a707dca04017f1161abe35e4a61e802978bab2a00c919227e205f2c393baa2ed8116a8a6f6de1a
-
SSDEEP
12288:D0O7z5yFi2LXuyD9ZvrPEHiPZFN/AxYY/aD4:jZyc2LXu47vr81YYCD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7ec753ae1f7ae0ea346ec57ea0f2161c615e15d6d64a443cfa549ffe73aa2273
Files
-
7ec753ae1f7ae0ea346ec57ea0f2161c615e15d6d64a443cfa549ffe73aa2273.exe windows:5 windows x86 arch:x86
8effd33c0c7d3209e4d0dde05803b13b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ScrollConsoleScreenBufferW
QueryPerformanceCounter
GetUserDefaultLCID
SetConsoleScreenBufferSize
InterlockedCompareExchange
AddConsoleAliasW
GetModuleHandleW
EnumCalendarInfoExW
ReadConsoleW
GetWindowsDirectoryA
EnumTimeFormatsW
GlobalAlloc
LoadLibraryW
GetVersionExW
GetFileAttributesA
HeapQueryInformation
GetMailslotInfo
GetStringTypeExA
CreateJobObjectA
EnumSystemLocalesA
GetProfileIntA
GetLastError
InterlockedFlushSList
GetProcAddress
VirtualAlloc
WaitNamedPipeA
BackupWrite
SetFirmwareEnvironmentVariableW
RemoveDirectoryA
CopyFileA
CreateSemaphoreW
WritePrivateProfileStringA
MoveFileA
AddAtomW
BeginUpdateResourceA
PostQueuedCompletionStatus
WriteProfileSectionW
FoldStringW
EnumResourceTypesW
GetModuleHandleA
FreeEnvironmentStringsW
VirtualProtect
OpenEventW
GetShortPathNameW
GetCPInfoExA
GetVersionExA
GetConsoleProcessList
DebugBreak
HeapSize
InterlockedIncrement
MultiByteToWideChar
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
RaiseException
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
user32
CharLowerBuffW
gdi32
GetBrushOrgEx
GetCharWidthI
Sections
.text Size: 370KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 439KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ