C:\legoduzevuna61\biyuni cumohedu32\zisimapomi\jojixu84\m.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a9c3992162cac921edf3ed00aae47d94.exe
Resource
win7-20240221-en
General
-
Target
a9c3992162cac921edf3ed00aae47d94
-
Size
459KB
-
MD5
a9c3992162cac921edf3ed00aae47d94
-
SHA1
88dd9e53c316abeb18ff1df9176f222412257a87
-
SHA256
e8eb04d0bf8f0b72e2528a5b7de31e1eed169325d5f40ddc9c96bce1e973a5cc
-
SHA512
d381c45b05782a04bf40614d6da04b675de3a3600c6dbe2960f40e8917282af067355413e9bb2365184707ecfbcd04fd02ef116bd5bf5f1e159af1312bfaf145
-
SSDEEP
6144:eV+LNf99CcsEwFkg59xFuNXr5b2ic06SNuWD5xJ2BWF1rt/cyRRTyRuvKftVvMGV:eV+pwztBeXtb2ic6Nttx0BiyCRTyg4t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9c3992162cac921edf3ed00aae47d94
Files
-
a9c3992162cac921edf3ed00aae47d94.exe windows:5 windows x86 arch:x86
b7ebe503aba8ff6fce4b2b89581116dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLocalTime
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
GetUserDefaultLCID
AddConsoleAliasW
SetVolumeMountPointW
EnumCalendarInfoExW
WriteFile
GetUserDefaultLangID
GetEnvironmentStrings
WriteConsoleOutputA
LeaveCriticalSection
lstrcpynW
FindNextVolumeW
VerifyVersionInfoA
HeapQueryInformation
GetModuleFileNameW
GetACP
GetConsoleOutputCP
GetProcAddress
GetComputerNameExW
VerLanguageNameA
CreateTimerQueueTimer
HeapUnlock
LocalAlloc
GetDefaultCommConfigA
GetModuleHandleA
QueueUserWorkItem
GetConsoleTitleW
PeekConsoleInputA
GetCPInfoExA
ReadConsoleInputW
GlobalReAlloc
LCMapStringW
PulseEvent
GetCommandLineW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
GetLastError
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
TerminateProcess
IsDebuggerPresent
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
FreeEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
HeapAlloc
HeapReAlloc
VirtualAlloc
WideCharToMultiByte
SetStdHandle
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
WriteConsoleA
WriteConsoleW
CreateFileA
user32
RealGetWindowClassW
gdi32
GetCharWidthFloatA
Sections
.text Size: 354KB - Virtual size: 354KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ