C:\tukokobaj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d5e8a897294fa288e99b89070e83b2ba2627a7f4941c0bc5c3a114933af65211.exe
Resource
win7-20240221-en
General
-
Target
d5e8a897294fa288e99b89070e83b2ba2627a7f4941c0bc5c3a114933af65211
-
Size
260KB
-
MD5
0b5dc3d9ffa5fed8df606a2e1df2df41
-
SHA1
8acdd054c69d34d872679443a7c7d6d546b9dc09
-
SHA256
d5e8a897294fa288e99b89070e83b2ba2627a7f4941c0bc5c3a114933af65211
-
SHA512
4878a9005a2e2c2cb40ebe8c5c2f36386218c55f1c45d12681f688e042704bc79be8785f0064da1c0a7a39577b405a82b9b6d426fa1cc4d9f0cabd003b2fa064
-
SSDEEP
3072:svpXQESqMbn1mNBsg21zvBuFRElvxS1VUAin48wWw4/55VqNG:n9bwNBx4zvBM2xSrNi4a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5e8a897294fa288e99b89070e83b2ba2627a7f4941c0bc5c3a114933af65211
Files
-
d5e8a897294fa288e99b89070e83b2ba2627a7f4941c0bc5c3a114933af65211.exe windows:5 windows x86 arch:x86
0c3f2cf9e47c10e842f2d44e413c1a98
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesLengthA
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
AddConsoleAliasW
GetFileAttributesExA
GetTickCount
FindNextVolumeMountPointA
GetNumberFormatA
GetWindowsDirectoryA
EnumTimeFormatsA
GlobalAlloc
GetLocaleInfoW
ReadConsoleInputA
GetThreadSelectorEntry
GetVersionExW
CreateDirectoryA
GetLastError
GetProcAddress
GetLocaleInfoA
RemoveDirectoryA
LoadLibraryA
WriteConsoleA
GlobalFindAtomW
SetEnvironmentVariableA
GetModuleFileNameA
GetConsoleTitleW
GetCurrentDirectoryA
DuplicateHandle
GetCurrentProcessId
GetVolumeInformationW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
CreateFileA
FindResourceA
VirtualAlloc
GetComputerNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RaiseException
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
SetFilePointer
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
CloseHandle
user32
CharLowerBuffA
CharUpperBuffW
LoadKeyboardLayoutW
GetAltTabInfoA
UnregisterClassA
gdi32
StretchDIBits
advapi32
ReadEventLogA
shell32
FindExecutableW
winhttp
WinHttpCheckPlatform
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 22.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ