C:\beyimalojow\lomuzekuji\boyohiku_puvufuhohe_non.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8843cc12deb2799e708e9f107b353232.exe
Resource
win7-20231215-en
General
-
Target
8843cc12deb2799e708e9f107b353232
-
Size
406KB
-
MD5
8843cc12deb2799e708e9f107b353232
-
SHA1
198cd2c42851c7265485247473b17e1a64efdbd7
-
SHA256
81a725dcae846b78c4534495f01c00db847a75a90d991d1f464fec7a4a67cdf5
-
SHA512
b11973649e4df52f72a00709e39ca1d3426c046846af9c1ced189735d92629603c01468e782e68b5cea4e4d47ab4d412a452eb7dd43b7d7d617bd4aaf22b51c8
-
SSDEEP
6144:YvIpDpBPP8iWF3FqSq52t4+zZ/ipdreC3kOlbCY8uGa2pInQ:fdBP8iWF3MSzmhyCUSbEuGa2pIn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8843cc12deb2799e708e9f107b353232
Files
-
8843cc12deb2799e708e9f107b353232.exe windows:5 windows x86 arch:x86
790ed2a101ffa52f01e32a348e567eff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
UnregisterWait
GetFileSize
GetNativeSystemInfo
SetFilePointer
GetConsoleAliasesLengthW
CopyFileExW
SetLocalTime
InterlockedIncrement
VerSetConditionMask
InterlockedDecrement
ZombifyActCtx
CompareFileTime
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GlobalLock
SetConsoleScreenBufferSize
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
VirtualFree
SetProcessPriorityBoost
ActivateActCtx
FindResourceExA
GetConsoleAliasExesLengthW
GetComputerNameExA
CreateSemaphoreA
GetFileAttributesW
GetBinaryTypeA
EnumResourceNamesW
GetOverlappedResult
CompareStringW
lstrlenW
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetCPInfoExW
OpenMutexW
GetCurrentDirectoryW
GetProcAddress
CreateNamedPipeA
WriteProfileSectionA
ReadFileEx
SetStdHandle
DisableThreadLibraryCalls
GetPrivateProfileStringA
LoadLibraryA
GetConsoleScreenBufferInfo
LocalAlloc
PostQueuedCompletionStatus
FindAtomA
WriteProfileStringW
FatalAppExitA
GetVersionExA
TlsAlloc
DeleteFileW
LCMapStringW
AreFileApisANSI
ReadFile
GetComputerNameA
GetLastError
MoveFileA
GetCommandLineA
HeapValidate
IsBadReadPtr
RaiseException
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
GetModuleHandleW
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetModuleHandleA
LCMapStringA
GetLocaleInfoA
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
CloseHandle
CreateFileA
gdi32
GetBoundsRect
winhttp
WinHttpOpen
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 137KB - Virtual size: 46.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ