C:\xavuci\fudanilodeboho83\guwajocicagoga25.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bcdfff17f59ec08ae2e0d1c420a36441.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcdfff17f59ec08ae2e0d1c420a36441.exe
Resource
win10v2004-20240226-en
General
-
Target
bcdfff17f59ec08ae2e0d1c420a36441
-
Size
176KB
-
MD5
bcdfff17f59ec08ae2e0d1c420a36441
-
SHA1
bc8e5c179ee65cdc43e7d6465ba148f264cef98c
-
SHA256
ec5d0c18661d4915a4e24d844eb5c53e560640e348e96f7edb39fb165660a9bb
-
SHA512
c064980467ecb4f7a5c90bae981796ebec073f28a14669f2d3f7b87218d94dafcb2f6cf7a5266180e0e4dcc85edfca93b15402a25d3bea6f2ba68bfe01baaf4c
-
SSDEEP
3072:WUR8oLwlyMMa4NfBw3ZQ0z0KV5gXtjSwrv9ENPGiR6KJIX:nRrLwlp4ZBw3iBtVvMGikK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcdfff17f59ec08ae2e0d1c420a36441
Files
-
bcdfff17f59ec08ae2e0d1c420a36441.exe windows:5 windows x86 arch:x86
b7ebe503aba8ff6fce4b2b89581116dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetLocalTime
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
GetUserDefaultLCID
AddConsoleAliasW
SetVolumeMountPointW
EnumCalendarInfoExW
WriteFile
GetUserDefaultLangID
GetEnvironmentStrings
WriteConsoleOutputA
LeaveCriticalSection
lstrcpynW
FindNextVolumeW
VerifyVersionInfoA
HeapQueryInformation
GetModuleFileNameW
GetACP
GetConsoleOutputCP
GetProcAddress
GetComputerNameExW
VerLanguageNameA
CreateTimerQueueTimer
HeapUnlock
LocalAlloc
GetDefaultCommConfigA
GetModuleHandleA
QueueUserWorkItem
GetConsoleTitleW
PeekConsoleInputA
GetCPInfoExA
ReadConsoleInputW
GlobalReAlloc
LCMapStringW
PulseEvent
GetCommandLineW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
GetLastError
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
TerminateProcess
IsDebuggerPresent
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
SetFilePointer
FreeEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
HeapAlloc
HeapReAlloc
VirtualAlloc
WideCharToMultiByte
SetStdHandle
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
WriteConsoleA
WriteConsoleW
CreateFileA
user32
RealGetWindowClassW
gdi32
GetCharWidthFloatA
Sections
.text Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ