C:\xesadab\susojesojen\ximuzabidubebu\foy93\wod.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a2f5ec3308212deca402cc142b9abf99.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2f5ec3308212deca402cc142b9abf99.exe
Resource
win10v2004-20240221-en
General
-
Target
a2f5ec3308212deca402cc142b9abf99
-
Size
365KB
-
MD5
a2f5ec3308212deca402cc142b9abf99
-
SHA1
09d9ec17ea12adf3cd9fde172de038ab923ecd89
-
SHA256
d00d061df7e1755564365a54aca6f255d58d58be7791465c0a07bd3033e1a223
-
SHA512
9ca4a5457913239c951b4b838c913df19b54e259ae43d763fd60cb32581d877727b15bee7a40697bba4052de5605a8b8b03309acc6fb4804e3163647254e3901
-
SSDEEP
6144:2TLiQ9OX7t6rnqbkVCqtcZJEfC4uBYCxIanX59EPCmK:kdOfk5Kl4uBiaX59Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2f5ec3308212deca402cc142b9abf99
Files
-
a2f5ec3308212deca402cc142b9abf99.exe windows:5 windows x86 arch:x86
80892f18aacf6a3ec193623c3a9507f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
SetLocalTime
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
GetUserDefaultLCID
WaitForSingleObject
AddConsoleAliasW
SetVolumeMountPointW
EnumCalendarInfoExW
ReadConsoleW
WriteFile
GetUserDefaultLangID
GetEnvironmentStrings
GlobalAlloc
WriteConsoleOutputA
GetVersionExW
PulseEvent
lstrcpynW
FindNextVolumeW
VerifyVersionInfoA
HeapQueryInformation
GetModuleFileNameW
GetACP
LCMapStringA
GetProcAddress
GetComputerNameExW
VerLanguageNameA
CreateTimerQueueTimer
FreeUserPhysicalPages
GetDefaultCommConfigA
GetModuleHandleA
QueueUserWorkItem
GetConsoleTitleW
VirtualProtect
PeekConsoleInputA
GetCPInfoExA
ReadConsoleInputW
CreateThread
LeaveCriticalSection
GetCommandLineW
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameA
HeapAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
HeapSize
FreeEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetOEMCP
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
user32
RealGetWindowClassW
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ