C:\azalia\Prod\IM\ph_exec.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fe1b479880db7637fc96d334f216e5e966879a77fac1b85d1fd892a050fbe638.exe
Resource
win11-20250217-en
General
-
Target
fe1b479880db7637fc96d334f216e5e966879a77fac1b85d1fd892a050fbe638
-
Size
70KB
-
MD5
760b7e6a810644e590d70673b6f5e63a
-
SHA1
f60f8a4a666d7c3226f30dddfe69472e1a88b579
-
SHA256
fe1b479880db7637fc96d334f216e5e966879a77fac1b85d1fd892a050fbe638
-
SHA512
8a583dc0e81b4e67053c3175fa29ab7042dbc621cbe7181a3bbfbc7661d6faea3b8be1a1fdcd968fcc388c94394de9858ec537c479c19f9878a831a20ddffd83
-
SSDEEP
1536:cFOPbkyoTwtPto0Rl0DsN9/zLec5oGFACZrqdKaNSEjrZKk:cYPxAwtPtoe/zLaGmCZrqcaYEjrZK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe1b479880db7637fc96d334f216e5e966879a77fac1b85d1fd892a050fbe638
Files
-
fe1b479880db7637fc96d334f216e5e966879a77fac1b85d1fd892a050fbe638.exe windows:5 windows x86 arch:x86
14d7a5762b03da9e2746411501b3d038
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
ws2_32
htonl
kernel32
WaitForMultipleObjects
CloseHandle
CreateThread
SetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
ResetEvent
CreateEventW
DeleteCriticalSection
CreateMutexW
CreateProcessW
GetCurrentProcess
SetHandleInformation
OpenProcess
GetLocaleInfoW
TerminateProcess
OpenMutexW
GetProcAddress
Process32FirstW
GetExitCodeThread
CreatePipe
Process32NextW
CreateFileW
CreateToolhelp32Snapshot
ReleaseMutex
GetVersion
GetVolumeInformationW
ExpandEnvironmentStringsW
GetLastError
GetModuleFileNameW
FindClose
FindNextFileW
FindFirstFileW
SetEndOfFile
SetFilePointerEx
GetFileAttributesW
ReadFile
GetFileSizeEx
MoveFileW
DeleteFileW
SetFileAttributesW
IsDebuggerPresent
CopyFileW
Sleep
HeapSize
TerminateThread
WriteFile
GetTickCount
GetLogicalDrives
GetComputerNameW
WaitForSingleObject
LoadLibraryW
MultiByteToWideChar
RtlUnwind
GetModuleHandleA
UnhandledExceptionFilter
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
GetModuleHandleW
ExitProcess
DecodePointer
GetStdHandle
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetStringTypeW
SetUnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
user32
GetShellWindow
GetWindowThreadProcessId
advapi32
RegQueryValueExW
CryptDecrypt
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptGenRandom
CryptSetKeyParam
CryptAcquireContextW
RegSetValueExW
RegCloseKey
RegOpenKeyExW
DuplicateTokenEx
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteExW
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.cdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE