C:\zigimehi\redodu yohojofitepoju57\zam.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0176b0e43ef3b5fa39b8732ff8a632f4a965e8c8671cac4d8c71524b3f3ffc63.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0176b0e43ef3b5fa39b8732ff8a632f4a965e8c8671cac4d8c71524b3f3ffc63.exe
Resource
win10v2004-20241007-en
General
-
Target
0176b0e43ef3b5fa39b8732ff8a632f4a965e8c8671cac4d8c71524b3f3ffc63
-
Size
289KB
-
MD5
e6770ace7e8cbc5e41c29752e1217d22
-
SHA1
34fc0ef90856235b8eacab521ee45ac1a0dc278b
-
SHA256
0176b0e43ef3b5fa39b8732ff8a632f4a965e8c8671cac4d8c71524b3f3ffc63
-
SHA512
3d7bd0a20e0f4bbf8c29542c979527d12aa5d654986b53c234fab60b98a12bf745b5a706a004bf1299e3e6e988c388d222480b06fbc104d0921001608a5b8f05
-
SSDEEP
6144:Cy2tLVqCtQv3szVxptfGP0zuxgmnigabwVf:Cy2thqCtQv3s5xDfJ+gmi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0176b0e43ef3b5fa39b8732ff8a632f4a965e8c8671cac4d8c71524b3f3ffc63
Files
-
0176b0e43ef3b5fa39b8732ff8a632f4a965e8c8671cac4d8c71524b3f3ffc63.exe windows:5 windows x86 arch:x86
da8505ec848c0e26c7399359cef63fd9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
GetModuleHandleA
InterlockedExchangeAdd
OpenWaitableTimerA
CreateEventW
ReadConsoleInputW
WaitNamedPipeW
CommConfigDialogA
SetSystemTimeAdjustment
FindNextFileA
EnumResourceTypesW
GetModuleFileNameW
UpdateResourceA
DeleteFileA
CopyFileA
VirtualAlloc
WriteConsoleOutputCharacterW
GetConsoleAliasW
PeekConsoleInputW
GlobalGetAtomNameA
GetShortPathNameA
GetPrivateProfileStringA
LocalAlloc
GetProcAddress
ReleaseActCtx
GetConsoleAliasA
FindFirstChangeNotificationA
WritePrivateProfileStringW
EnumResourceNamesW
LockFile
CommConfigDialogW
lstrcpynA
AddAtomW
AllocConsole
GetLongPathNameW
GetProcessHandleCount
GetLastError
GetSystemDefaultLCID
GetSystemDefaultLangID
OpenJobObjectW
EnterCriticalSection
FindResourceExA
_hwrite
GlobalWire
GetComputerNameA
GetVersionExA
SetFileShortNameA
GetVolumeNameForVolumeMountPointA
GetFileSizeEx
GetFileAttributesExA
SetComputerNameW
GetFileAttributesW
GetVolumePathNameA
FoldStringW
CreateFileA
CloseHandle
RtlUnwind
MultiByteToWideChar
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
user32
ScreenToClient
msimg32
AlphaBlend
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ