C:\xufoninoba-96_cawigibenedo\povime\sicowos\boso rayojudawuju.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9a42abc6cd81dd9f0c71f9a0009cc37e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a42abc6cd81dd9f0c71f9a0009cc37e.exe
Resource
win10v2004-20231222-en
General
-
Target
9a42abc6cd81dd9f0c71f9a0009cc37e
-
Size
11.2MB
-
MD5
9a42abc6cd81dd9f0c71f9a0009cc37e
-
SHA1
525b1f51dc56073d2cc2bfdf77735454edca9cbe
-
SHA256
27a4b27390c96a355bcea14d11dad9f4a661f60390e8be894186a3f70d501887
-
SHA512
b940ae91f7b6644f16b00de828f20004c7e9f6a6e9240b1513e0249f9c454ff835fe15b1c952ccb97d1c7ef9bb568f2a23986b3ed8786c58f9086d6665d41049
-
SSDEEP
49152:K8yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyn:K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a42abc6cd81dd9f0c71f9a0009cc37e
Files
-
9a42abc6cd81dd9f0c71f9a0009cc37e.exe windows:5 windows x86 arch:x86
705a372c868b933d973ca642948b7012
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
EnumResourceNamesW
SetVolumeLabelA
SearchPathW
FindFirstFileW
OpenFile
SetLocalTime
SetEndOfFile
GetNumberOfConsoleInputEvents
InterlockedIncrement
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
GetProfileStringW
GetProfileSectionA
SetComputerNameW
GetComputerNameW
CreateDirectoryExA
CallNamedPipeW
GetModuleHandleW
GenerateConsoleCtrlEvent
GetSystemWow64DirectoryA
EnumResourceTypesA
GetDriveTypeA
TlsSetValue
FindResourceExA
GlobalAlloc
AddRefActCtx
GetVolumeInformationA
Sleep
ReadFileScatter
GetConsoleWindow
GetSystemTimeAdjustment
GetVersionExW
InterlockedPopEntrySList
GlobalFlags
VerifyVersionInfoA
GetBinaryTypeA
TerminateProcess
ReadFile
CompareStringW
lstrlenW
SetConsoleTitleA
GlobalUnlock
LCMapStringA
GetConsoleOutputCP
CreateDirectoryA
InterlockedExchange
GetFileSizeEx
GetStdHandle
IsDBCSLeadByteEx
GetProcAddress
WriteProfileSectionA
FreeUserPhysicalPages
CreateMemoryResourceNotification
SearchPathA
GetPrivateProfileStringA
GetAtomNameA
Process32FirstW
OpenWaitableTimerW
SetCalendarInfoW
IsSystemResumeAutomatic
SetFileApisToANSI
GetCommMask
AddAtomA
GetTapeParameters
GetSystemInfo
GetOEMCP
SetConsoleCursorInfo
CreateIoCompletionPort
WaitCommEvent
FreeEnvironmentStringsW
GetConsoleTitleW
BuildCommDCBA
GetCurrentDirectoryA
CompareStringA
GetWindowsDirectoryW
GetCurrentProcessId
CopyFileExA
DeleteFileA
GetModuleHandleA
CreateFileA
GetLastError
MoveFileA
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
RtlUnwind
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
LoadLibraryA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
SetStdHandle
WriteConsoleA
user32
GetMenuBarInfo
GetMenuInfo
GetComboBoxInfo
GetMenuCheckMarkDimensions
Sections
.text Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.9MB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ