C:\dezelubedo\zazehig11\sezo29_havefetezewof_xukopup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2be63aef4bc0b673b8b2979e0b9de11fc8ef6d62a6a2106ee4d8874021f8f961.exe
Resource
win7-20240221-en
General
-
Target
2be63aef4bc0b673b8b2979e0b9de11fc8ef6d62a6a2106ee4d8874021f8f961
-
Size
389KB
-
MD5
03f678b5a33e2ee8110c7f0e7a1e1839
-
SHA1
7e90f0e9c31cb859cffbcb0fd0634f244452f1df
-
SHA256
2be63aef4bc0b673b8b2979e0b9de11fc8ef6d62a6a2106ee4d8874021f8f961
-
SHA512
2865b726b71a17addd27eb375e49ba4a78356d37c54a544f8c1cda2ad6a6e770ff18a28a8b7fed4621bca76e52b327ebfdd6c59e344425931404e550ed6bab31
-
SSDEEP
6144:i7trCt9TbqKTZpiXXBfc/kctOpYplmPeFsvD8oom1ub:z1bLTmH1ctOAmPeFUDjcb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2be63aef4bc0b673b8b2979e0b9de11fc8ef6d62a6a2106ee4d8874021f8f961
Files
-
2be63aef4bc0b673b8b2979e0b9de11fc8ef6d62a6a2106ee4d8874021f8f961.exe windows:5 windows x86 arch:x86
0c3f2cf9e47c10e842f2d44e413c1a98
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesLengthA
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
AddConsoleAliasW
GetFileAttributesExA
GetTickCount
FindNextVolumeMountPointA
GetNumberFormatA
GetWindowsDirectoryA
EnumTimeFormatsA
GlobalAlloc
GetLocaleInfoW
ReadConsoleInputA
GetThreadSelectorEntry
GetVersionExW
CreateDirectoryA
GetLastError
GetProcAddress
GetLocaleInfoA
RemoveDirectoryA
LoadLibraryA
WriteConsoleA
GlobalFindAtomW
SetEnvironmentVariableA
GetModuleFileNameA
GetConsoleTitleW
GetCurrentDirectoryA
DuplicateHandle
GetCurrentProcessId
GetVolumeInformationW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
CreateFileA
FindResourceA
VirtualAlloc
GetComputerNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RaiseException
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
SetFilePointer
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
CloseHandle
user32
CharLowerBuffA
CharUpperBuffW
LoadKeyboardLayoutW
GetAltTabInfoA
UnregisterClassA
gdi32
StretchDIBits
advapi32
ReadEventLogA
shell32
FindExecutableW
winhttp
WinHttpCheckPlatform
Sections
.text Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 22.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ