C:\xeyafahi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b9ec7a2b981cf037c610adddbc3e4388.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9ec7a2b981cf037c610adddbc3e4388.exe
Resource
win10v2004-20240226-en
General
-
Target
b9ec7a2b981cf037c610adddbc3e4388
-
Size
14.1MB
-
MD5
b9ec7a2b981cf037c610adddbc3e4388
-
SHA1
ec8600763cbd4b39b62975156556eec5f1aeb605
-
SHA256
48e99bdd9f0bd33ca5ba524f190ef14f2a9fa754b45fcd3b6060d542092f3de5
-
SHA512
68c5d86c27e8a7493c3baa942f7e587f7d06253ec5c1afab82bd9923eceb94beb31ab585f4ae024bff34608e69ef252f1dec731687ed4dce4f2241a6035c8744
-
SSDEEP
24576:yG8888888888888888888888888888888888888888888888888888888888888f:
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9ec7a2b981cf037c610adddbc3e4388
Files
-
b9ec7a2b981cf037c610adddbc3e4388.exe windows:5 windows x86 arch:x86
02fed18d5788c3d9bcc1897631bb2a01
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasesLengthW
WriteConsoleOutputCharacterA
BuildCommDCBAndTimeoutsA
WriteConsoleOutputW
EndUpdateResourceW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
WaitForSingleObject
GetSystemDefaultLCID
GetModuleHandleW
EnumCalendarInfoExW
SetThreadUILanguage
GetConsoleAliasesLengthA
GetConsoleTitleA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
SetVolumeMountPointA
lstrcpynW
SetConsoleCursorPosition
GetFileAttributesW
SetTimeZoneInformation
WriteConsoleW
IsBadWritePtr
GetMailslotInfo
lstrcatA
lstrlenW
FlushFileBuffers
InterlockedExchange
FillConsoleOutputCharacterW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
PeekConsoleInputW
EnumDateFormatsExA
CreateTimerQueueTimer
LocalLock
EnterCriticalSection
GlobalGetAtomNameA
ResetEvent
GetLocalTime
LoadLibraryA
LocalAlloc
SetConsoleOutputCP
SetFileApisToANSI
GetOEMCP
GetModuleHandleA
HeapSetInformation
GetCPInfoExA
FindFirstVolumeA
DeleteTimerQueueTimer
GetCurrentProcessId
GetConsoleProcessList
GetModuleFileNameW
GetSystemDefaultLangID
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
Sleep
ExitProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
HeapSize
GetCPInfo
GetACP
IsValidCodePage
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetAltTabInfoW
Exports
Exports
@SetFirstEverVice@8
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14.0MB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ