c:\late\Prove\ran\busy\operate\Pass\womanEspecially.pdb
Static task
static1
Behavioral task
behavioral1
Sample
05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3cN.dll
Resource
win7-20240903-en
General
-
Target
05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3cN.exe
-
Size
971KB
-
MD5
257a35e347e7f71dc1425ff153ec2510
-
SHA1
79a6d6e5ebc2d8357d3c3e4c0ac2bee55eea5fb2
-
SHA256
05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3c
-
SHA512
593399bdd9ec38f3c4b5c901243241bfb33885835cfd5e5f5a67d2052b0a4c67290dde0d42a0541234164857ec75bf6b63f6e1eeab076bed0e3b3b785a8f7c61
-
SSDEEP
24576:dGlkSyXOKByXVHmuUAQrFZ5J5EdG9UAGPatVWZ:oyeKByF5U9FZ5J5YatVWZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3cN.exe
Files
-
05e33f5e53db406bfa76e2bf569b1c21b4bffec3b90d1e8059963a2214d97e3cN.exe.dll windows:5 windows x86 arch:x86
5b6e5b7469bbd540d936e79c1e1ec4b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CloseHandle
CreateFileW
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
IsProcessorFeaturePresent
LCMapStringW
OutputDebugStringW
WriteConsoleW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
GetVersion
TlsAlloc
VirtualProtect
DeviceIoControl
RemoveDirectoryA
LoadLibraryA
FileTimeToSystemTime
CreateEventA
Sleep
GetWindowsDirectoryA
WaitForSingleObject
OutputDebugStringA
TlsGetValue
GetCurrentThreadId
DecodePointer
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TlsSetValue
TlsFree
GetProcAddress
GetModuleHandleW
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapValidate
IsBadReadPtr
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
GetModuleFileNameW
RtlUnwind
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
WriteFile
FlushFileBuffers
user32
EmptyClipboard
ValidateRect
DestroyMenu
MapWindowPoints
LoadBitmapA
BeginPaint
GetIconInfo
SetWindowTextA
InvalidateRect
IsDialogMessageA
SendMessageTimeoutA
CheckDlgButton
PostMessageA
GetSystemMetrics
ole32
CoCreateInstance
CoUninitialize
CLSIDFromString
CoInitialize
shlwapi
PathGetArgsA
comdlg32
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
ChooseFontA
CommDlgExtendedError
comctl32
ImageList_Remove
InitCommonControlsEx
ImageList_SetBkColor
ImageList_SetIconSize
ImageList_Destroy
ImageList_SetDragCursorImage
Exports
Exports
Brancheye
Sections
.text Size: 724KB - Virtual size: 723KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 9.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ