C:\rubot23-yoceyohawokero tevabeji\noji.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ea98c56328b0659d7bfe4a2a04cb0a4c6c10ad5ce9f05c305b9264f305095c86.exe
Resource
win7-20240221-en
General
-
Target
ea98c56328b0659d7bfe4a2a04cb0a4c6c10ad5ce9f05c305b9264f305095c86.exe
-
Size
254KB
-
MD5
056d02ea6dc581ad442aee7313ac4a3b
-
SHA1
700f0c0942dbe394c770af54034460f5890081bd
-
SHA256
ea98c56328b0659d7bfe4a2a04cb0a4c6c10ad5ce9f05c305b9264f305095c86
-
SHA512
d5f3510f604cf8fe33f5055e490c14a1952f8ae2a66c3ae5a24e7e90783c48e7c7d5774b1dc8e17391a9c3c9551f523ffd9693ffb0263dff05621ad3cd8c6190
-
SSDEEP
3072:nTyaDCKblRBnWMG9ZVeQfLYbEtbtExMub+nf0LOAtmAGqTgREilXzdQ5zpq/:GHMNU2Qf0gtKxR+nfEmAdT2EihJ2k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea98c56328b0659d7bfe4a2a04cb0a4c6c10ad5ce9f05c305b9264f305095c86.exe
Files
-
ea98c56328b0659d7bfe4a2a04cb0a4c6c10ad5ce9f05c305b9264f305095c86.exe.exe windows:5 windows x86 arch:x86
7641afddf4654d16195180656b07d0a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesLengthA
InterlockedIncrement
ReadConsoleA
GetConsoleAliasA
InterlockedDecrement
GetCurrentProcess
GetComputerNameW
GetModuleHandleW
GetTickCount
GenerateConsoleCtrlEvent
FindNextVolumeMountPointA
ReadConsoleW
CreateRemoteThread
GetConsoleAliasExesW
CreateDirectoryExW
GlobalAlloc
GetVolumeInformationA
GlobalFindAtomA
LoadLibraryW
GetLocaleInfoW
ReadConsoleInputA
GetTimeFormatW
GetLocaleInfoA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
RemoveDirectoryA
SetStdHandle
SetComputerNameA
GetTempFileNameA
LoadLibraryA
InterlockedExchangeAdd
GetNumberFormatW
DeviceIoControl
GetConsoleTitleW
GetFileAttributesExW
AddConsoleAliasA
CloseHandle
CreateFileA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
GetModuleHandleA
FlushFileBuffers
RtlUnwind
HeapSize
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetAltTabInfoA
SetMenu
LoadKeyboardLayoutA
CharUpperBuffA
advapi32
InitiateSystemShutdownA
Sections
.text Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 22.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ