D:\qci_workspace\root-workspaces\__qci-pipeline-10989745-2\Basic\Output\BinFinal\QQPCRTP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3382-Se Emite Sentencia Tutela Rad. 2024-00933.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3382-Se Emite Sentencia Tutela Rad. 2024-00933.exe
Resource
win10v2004-20241007-en
General
-
Target
f85c09977240aa92f524a818716798cb.zip
-
Size
498KB
-
MD5
f85c09977240aa92f524a818716798cb
-
SHA1
50f147c52fff18d6826852e92ce0cc4175a9e1d8
-
SHA256
b025ba88fa61a2bbbe5cb4c60ae4a62ece691f1a815e935dfd7f3380d4ee83bf
-
SHA512
be30c3b37d81eadf20da708cede5751257b650fca7138d32cbe68dc85f11d12398d8b41a5ccb25f88182481cf641b9de10a1d2341d5dc9a96ab6b66b9991fc69
-
SSDEEP
6144:0ctFcQKD5AkNYUh0hl0ZHEAh6STKxmY27Cash89SdJXQJnwunpdAdERFHmTip011:nQ9AkNbShlAxKxdadcJAJnwunpdzySE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/3382-Se Emite Sentencia Tutela Rad. 2024-00933.exe
Files
-
f85c09977240aa92f524a818716798cb.zip.zip
Password: 3382
-
3382-Se Emite Sentencia Tutela Rad. 2024-00933.exe.exe windows:6 windows x86 arch:x86
Password: 3382
2e1738f1c0539380b62dfe540512939e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
ws2_32
htons
htonl
ntohs
ntohl
kernel32
InitializeSListHead
IsProcessorFeaturePresent
WaitForSingleObjectEx
GetSystemPowerStatus
GetNativeSystemInfo
GetSystemDefaultLangID
MapViewOfFileEx
lstrlenW
GetTimeFormatW
GetDateFormatW
GetCurrencyFormatW
GetNumberFormatW
GetLocaleInfoW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
InitializeCriticalSectionEx
GetLastError
RaiseException
LoadLibraryW
GetProcAddress
DeleteCriticalSection
SetLastError
TerminateProcess
GetModuleFileNameW
OpenProcess
CreateToolhelp32Snapshot
ProcessIdToSessionId
Sleep
Process32NextW
Process32FirstW
CloseHandle
VerSetConditionMask
ReadProcessMemory
GetCurrentProcessId
GetModuleHandleW
VerifyVersionInfoW
OpenMutexW
WaitForSingleObject
CreateEventW
SetEvent
ResetEvent
ReadFile
SizeofResource
HeapFree
EnterCriticalSection
VirtualFree
GetCurrentProcess
WriteFile
VirtualAlloc
LeaveCriticalSection
SetFilePointer
CreateFileW
GetVersionExW
HeapSize
OutputDebugStringW
GetCurrentThread
LockResource
DeleteFileW
HeapReAlloc
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
HeapDestroy
GetProcessHeap
SetThreadPriority
GetThreadPriority
UnhandledExceptionFilter
DeviceIoControl
GetVersion
ExitProcess
FreeLibrary
GetTickCount64
GetSystemInfo
GlobalMemoryStatusEx
QueryPerformanceFrequency
CreateMutexW
GetSystemDirectoryW
IsDebuggerPresent
WaitForMultipleObjects
GetProcessId
WTSGetActiveConsoleSessionId
GetExitCodeProcess
GetModuleHandleExW
GetCurrentThreadId
FormatMessageW
LocalFree
CreateTimerQueueTimer
ExpandEnvironmentStringsW
OpenEventW
ReleaseMutex
SleepEx
GetSystemTimeAsFileTime
DeleteTimerQueueTimer
GetTickCount
GetProcessTimes
LoadLibraryExW
SetConsoleCtrlHandler
MoveFileExW
CreateProcessW
CopyFileW
CreateThread
lstrcmpiW
VirtualQuery
VirtualProtect
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
SuspendThread
LoadLibraryA
SetProcessWorkingSetSize
GetCommandLineA
GetProcessHandleCount
GetProcessIoCounters
lstrcpynW
SetErrorMode
InitializeCriticalSection
SearchPathW
IsBadReadPtr
IsBadWritePtr
SetUnhandledExceptionFilter
WriteProcessMemory
GetCommandLineW
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
SwitchToThread
UnmapViewOfFile
CreateFileMappingW
WideCharToMultiByte
GetFileAttributesW
FindFirstFileW
SystemTimeToFileTime
FindNextFileW
FindClose
GetTempPathW
QueryPerformanceCounter
user32
SetWindowPos
GetGuiResources
MsgWaitForMultipleObjects
PeekMessageW
GetMessageW
CreateDialogParamW
GetWindowRect
TranslateMessage
SendMessageW
GetSystemMetrics
ShowWindow
DispatchMessageW
SetFocus
GetDlgItem
advapi32
RegQueryValueExW
RegOpenKeyExW
OpenProcessToken
RegSetValueExW
RegCloseKey
OpenTraceW
ControlTraceW
CloseTrace
ProcessTrace
StartTraceW
DuplicateTokenEx
RegQueryInfoKeyW
RegSetKeySecurity
RegGetKeySecurity
RegNotifyChangeKeyValue
RegEnumValueW
RegEnumKeyExW
RegFlushKey
RegisterServiceCtrlHandlerExW
CreateServiceW
RegDeleteKeyW
SetServiceStatus
ChangeServiceConfig2W
DeleteService
StartServiceCtrlDispatcherW
QueryServiceStatus
RegCreateKeyExW
StartServiceW
RegDeleteValueW
SetTokenInformation
ImpersonateLoggedOnUser
CloseServiceHandle
OpenSCManagerW
ControlService
OpenServiceW
QueryServiceStatusEx
LookupPrivilegeValueW
CreateProcessAsUserW
GetTokenInformation
shell32
CommandLineToArgvW
ole32
CoUninitialize
CoInitialize
shlwapi
PathAddBackslashW
PathAppendW
PathRemoveFileSpecW
PathStripPathA
PathFileExistsW
StrStrIW
StrFormatByteSizeW
StrFormatKBSizeW
StrFromTimeIntervalW
SHGetValueW
psapi
EnumProcessModules
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcesses
GetProcessMemoryInfo
GetModuleBaseNameW
Sections
.text Size: 336KB - Virtual size: 336KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 154KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 628KB - Virtual size: 627KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ