C:\fuv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab482cc38db2f1f8417c35b4e2950de85c9bdffb369b216c86fa087aa6ca160f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ab482cc38db2f1f8417c35b4e2950de85c9bdffb369b216c86fa087aa6ca160f.exe
Resource
win10-20231220-en
General
-
Target
ab482cc38db2f1f8417c35b4e2950de85c9bdffb369b216c86fa087aa6ca160f
-
Size
384KB
-
MD5
e7355de0ccb85649da0864e1959f3713
-
SHA1
03dc16d606398f559ddef97ecc44ee01e1d8019d
-
SHA256
ab482cc38db2f1f8417c35b4e2950de85c9bdffb369b216c86fa087aa6ca160f
-
SHA512
9ebc6c0714eb46e67d6d771841d495deb2d0edbb01e685aabfe82e22f5ecd48f407f24276bfe8ea960997d1957543f2cb8c104ca817cf17e4f75074afc054460
-
SSDEEP
6144:JI8BEGL3NhnNYylS3IqkGgtwSdlgYGQWq9Cc184YDdUp+u:JXiENhNXlaIqkbttpX84f4u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab482cc38db2f1f8417c35b4e2950de85c9bdffb369b216c86fa087aa6ca160f
Files
-
ab482cc38db2f1f8417c35b4e2950de85c9bdffb369b216c86fa087aa6ca160f.exe windows:5 windows x86 arch:x86
52c989b623059b029b98f089e46c54ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadResource
GetCurrentProcess
CreateJobObjectW
InterlockedCompareExchange
SignalObjectAndWait
GetComputerNameW
GetModuleHandleW
GetTickCount
FormatMessageA
GetWindowsDirectoryA
EnumTimeFormatsA
GetDateFormatA
TzSpecificLocalTimeToSystemTime
GetVolumePathNameW
GlobalAlloc
SetFileShortNameW
GlobalFindAtomA
GetConsoleAliasExesLengthW
SetConsoleCursorPosition
CreateFileW
LCMapStringA
GetConsoleAliasesW
OpenMutexW
GetLastError
SetLastError
GetProcAddress
BackupWrite
HeapUnlock
RemoveDirectoryA
SetComputerNameA
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingA
CreateFileMappingW
FindFirstVolumeMountPointW
SetThreadIdealProcessor
FoldStringA
VirtualProtect
CompareStringA
GetCurrentThreadId
OpenSemaphoreW
EndUpdateResourceA
TerminateJobObject
GlobalAddAtomW
ReadConsoleOutputCharacterW
TlsGetValue
FindVolumeClose
EnumDateFormatsExW
VirtualAlloc
GetNativeSystemInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
HeapAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetMessageExtraInfo
CharUpperW
DdeQueryStringA
gdi32
CreateCompatibleBitmap
GetDeviceGammaRamp
advapi32
SetKernelObjectSecurity
ole32
StringFromCLSID
Sections
.text Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 38.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ