C:\vudecebecatizada56 terijup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3eN.exe
Resource
win10v2004-20250217-en
General
-
Target
3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3eN.exe
-
Size
568KB
-
MD5
a20ae517e382600d758d3e9ddfbb9a50
-
SHA1
e122fb6f9bb149587767fba46dfdf157b958aad2
-
SHA256
3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3e
-
SHA512
a175a98abe5b79c093481131a52c17843608ac021f3a30045e7d8f5e328e483923454623c9e0f23cc72740097e95d91912438ab9bbf55cc908809e4bc37e2c0e
-
SSDEEP
12288:d1ksXDvf90b7H2jCwnEu+e/RrCmzpg3/B0CK:dus2PH2jCwn/aUpQ//K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3eN.exe
Files
-
3caae85cb9def5229f124b85d696bd9fbfee5ff99f4b74c060a27982a2febb3eN.exe.exe windows:5 windows x86 arch:x86
b1bf563b7cbc14c1932f2e99c3659c50
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetInformationJobObject
SetLastError
lstrlenW
WriteFile
GetConsoleCursorInfo
PeekConsoleInputA
ProcessIdToSessionId
GetNumberFormatA
GetLastError
LoadLibraryA
lstrcatW
GlobalAlloc
GetProcAddress
ExitProcess
GetTickCount
GetCurrencyFormatA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
FreeLibrary
LoadLibraryExW
HeapAlloc
HeapReAlloc
HeapFree
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetProcessHeap
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
WriteConsoleW
CreateFileW
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 447KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ