C:\yeduzeka74\kotitiy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cced13549d1dc6d9e54b540e834073a279a413257d5609ab7223aab9845897d1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cced13549d1dc6d9e54b540e834073a279a413257d5609ab7223aab9845897d1.exe
Resource
win10v2004-20241007-en
General
-
Target
38f0a08d54942bddaa52759b1b4447d407ee02407446230124971d20b472816d
-
Size
199KB
-
MD5
6d4828dafed5c3f706de5ec744248e43
-
SHA1
fc8d982965eb9edb18c8960fde532d96b55984a0
-
SHA256
38f0a08d54942bddaa52759b1b4447d407ee02407446230124971d20b472816d
-
SHA512
f5fdefb581bcc88612249518e2d09c1e278e90d324f2cc35bd03e1a60a5169c44aa6fe2c400846fff18c5130d7d14a73c8e937f97b648179f7a43ed416443831
-
SSDEEP
6144:MSCIpFr5X/OlL5YQh1QSkMJUiqMJ5JDS3:McpFrtOLTQmmMTS3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/cced13549d1dc6d9e54b540e834073a279a413257d5609ab7223aab9845897d1.exe
Files
-
38f0a08d54942bddaa52759b1b4447d407ee02407446230124971d20b472816d.zip
Password: infected
-
cced13549d1dc6d9e54b540e834073a279a413257d5609ab7223aab9845897d1.exe.exe windows:5 windows x86 arch:x86
75d112a417a21f39fc1b1ceff903e344
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedExchangeAdd
OpenWaitableTimerA
CreateEventW
ReadConsoleInputW
WaitNamedPipeW
CommConfigDialogA
SetSystemTimeAdjustment
FindNextFileA
EnumResourceTypesW
GetModuleFileNameA
UpdateResourceA
LoadLibraryW
DeleteFileA
CopyFileA
VirtualAlloc
WriteConsoleOutputCharacterW
GetConsoleAliasW
PeekConsoleInputW
GlobalGetAtomNameA
GetShortPathNameA
GetPrivateProfileStringW
LocalAlloc
GetProcAddress
GetConsoleAliasA
FindFirstChangeNotificationA
WritePrivateProfileStringW
EnumResourceNamesW
LockFile
CommConfigDialogW
lstrcpynA
AddAtomW
AllocConsole
GetLongPathNameW
GetProcessHandleCount
GetLastError
GetSystemDefaultLCID
GetSystemDefaultLangID
OpenJobObjectW
EnterCriticalSection
FindResourceExA
_hwrite
GlobalWire
GetComputerNameA
GetVersionExA
SetFileShortNameA
GetVolumeNameForVolumeMountPointA
GetFileSizeEx
GetFileAttributesExA
SetComputerNameW
GetFileAttributesW
GetVolumePathNameA
FoldStringW
GetModuleHandleA
ReleaseActCtx
LoadLibraryA
CreateFileA
CloseHandle
RtlUnwind
MultiByteToWideChar
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
Sleep
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
user32
ScreenToClient
gdi32
GetCharacterPlacementW
advapi32
CloseEventLog
msimg32
AlphaBlend
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ