d:\tilovck\bunkfi\ecsxcec\zst\egeueos\oaxhoegy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
980bc74ec80969bd1b0a1016c2953ffb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
980bc74ec80969bd1b0a1016c2953ffb.exe
Resource
win10v2004-20231215-en
General
-
Target
980bc74ec80969bd1b0a1016c2953ffb
-
Size
296KB
-
MD5
980bc74ec80969bd1b0a1016c2953ffb
-
SHA1
1af5e602437ae2a4ff69cb019cd782ad08a67e92
-
SHA256
c055c1116dd0cb1f752ce37fd030441c43e647f8614ad65fac26fa5129b5f514
-
SHA512
dcb7de78bfa3c0f025b18fc217e1fb6acb99ed08e22b27e9bcb0219e676cc87cb122fcb86f54d86b48a750b7074042d917810df7ebbebe75e5e5cc87cd00e3fd
-
SSDEEP
6144:6A5o0oIqD6fkZKuFoopYg1dinl0ECEvlQj64rUoOk6UQLYoL:6AJoPekZ92id7Ebtq64rUoMUQLY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 980bc74ec80969bd1b0a1016c2953ffb
Files
-
980bc74ec80969bd1b0a1016c2953ffb.exe windows:4 windows x86 arch:x86
c3dcfe75112cddf847eb79a302387940
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
SetDIBitsToDevice
GetTextExtentExPointW
StartDocA
SetDeviceGammaRamp
GetAspectRatioFilterEx
GetStretchBltMode
FillRgn
kernel32
IsBadWritePtr
LCMapStringA
GetProcAddress
GetModuleHandleA
GetEnvironmentStrings
GetStringTypeA
GetCurrentProcessId
InterlockedDecrement
UnhandledExceptionFilter
GetModuleFileNameW
GetStdHandle
QueryPerformanceCounter
GetLocalTime
VirtualQuery
ExitProcess
LCMapStringW
SetEnvironmentVariableA
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSection
SetHandleCount
ReadFile
GetLogicalDriveStringsA
CompareStringW
SetFilePointer
CreateSemaphoreA
VirtualFree
GetTickCount
WaitForDebugEvent
TlsAlloc
WideCharToMultiByte
GetStartupInfoA
DeleteCriticalSection
TlsSetValue
GetSystemTimeAsFileTime
GetOEMCP
SetLastError
GetCommandLineA
HeapDestroy
CloseHandle
InterlockedExchange
GetModuleFileNameA
InterlockedIncrement
SetConsoleCP
SetTimeZoneInformation
GetPrivateProfileStructA
EnterCriticalSection
TlsFree
WriteFile
GetTimeZoneInformation
GetFileType
CompareStringA
HeapFree
HeapAlloc
DosDateTimeToFileTime
CreateEventW
FreeEnvironmentStringsA
VirtualAlloc
Sleep
GetCPInfo
HeapReAlloc
LeaveCriticalSection
CreateMutexA
GetVersion
HeapLock
GetSystemTime
MultiByteToWideChar
GetCurrentProcess
EnumResourceTypesW
SetStdHandle
EnumResourceNamesW
FindFirstFileW
GetPrivateProfileIntW
FlushFileBuffers
GetCurrentThreadId
GetStringTypeW
OpenMutexA
GetLastError
ReadConsoleA
GetCurrentThread
TerminateProcess
RtlUnwind
GetThreadTimes
LoadLibraryA
TlsGetValue
GetACP
comctl32
InitCommonControlsEx
wininet
InternetGetConnectedState
InternetQueryFortezzaStatus
ReadUrlCacheEntryStream
InternetAlgIdToStringA
FindFirstUrlCacheEntryExA
FindFirstUrlCacheEntryW
FindNextUrlCacheGroup
InternetReadFile
shell32
InternalExtractIconListW
DragQueryFileAorW
DragAcceptFiles
SHFreeNameMappings
ExtractIconW
user32
RedrawWindow
CreateIcon
CreatePopupMenu
GetCursorPos
RegisterClassA
RegisterClassExA
InternalGetWindowText
SetScrollInfo
IsCharUpperW
PeekMessageW
GetParent
IsDialogMessageW
SetMenuDefaultItem
MapVirtualKeyW
DefWindowProcA
MessageBoxA
CallNextHookEx
CreateWindowExA
wvsprintfW
GetMessageW
SetCursor
ShowWindow
EndDeferWindowPos
Sections
.text Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ