C:\sefosami\dovepaguje36\kowugikexixuna\tulafojewonab.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d50b07993334e7b45055966859f8d3a9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d50b07993334e7b45055966859f8d3a9.exe
Resource
win10v2004-20231215-en
General
-
Target
d50b07993334e7b45055966859f8d3a9
-
Size
10.0MB
-
MD5
d50b07993334e7b45055966859f8d3a9
-
SHA1
6c6c43873b91001d3eac983e37226f9edda56309
-
SHA256
5eddb28e2820dc7911bb42512ba8138c6f723fb17a4cbd9a149650063bcf2803
-
SHA512
bcc27eddbe7e416e0c22d42901bc9d405de25e60944b764c4514a22f8985c1507ab89ad712fd05c9f107eb8db0e3874ec54633f564846cbdfebfe5c8037e6794
-
SSDEEP
196608:RJcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpcpch:4qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d50b07993334e7b45055966859f8d3a9
Files
-
d50b07993334e7b45055966859f8d3a9.exe windows:5 windows x86 arch:x86
169d152bc3371452dbec26f63a5e0c58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLCID
AddRefActCtx
GetCPInfoExA
WriteConsoleInputW
ReadConsoleInputW
GetTapeParameters
WaitCommEvent
GetNumaNodeProcessorMask
GetConsoleCP
VerifyVersionInfoA
WaitNamedPipeW
CreateMutexA
WriteConsoleW
GetLastError
CreateFileA
DeleteFileW
WritePrivateProfileSectionA
GetPrivateProfileSectionW
GetLongPathNameW
SetStdHandle
LoadLibraryW
IsDebuggerPresent
FindFirstVolumeW
WriteFile
BuildCommDCBW
FindActCtxSectionStringW
VerLanguageNameW
SetFileShortNameA
WriteProcessMemory
GetFileAttributesW
SetEvent
IsBadReadPtr
SleepEx
WaitForSingleObject
LoadResource
GetLongPathNameA
FreeConsole
SetConsoleCtrlHandler
SetConsoleTitleW
GetCurrentConsoleFont
SetConsoleTextAttribute
AttachConsole
GetConsoleAliasesLengthW
ReadConsoleA
ReadConsoleOutputW
BuildCommDCBAndTimeoutsA
HeapUnlock
HeapLock
GetAtomNameW
HeapReAlloc
HeapCompact
GetGeoInfoW
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CreateThread
GetVersionExW
GetACP
WaitForMultipleObjects
VerifyVersionInfoW
SetCalendarInfoA
CommConfigDialogA
GetConsoleWindow
FindAtomW
SetFileApisToOEM
GetStringTypeA
HeapSize
GetDiskFreeSpaceA
GetTapePosition
GetConsoleAliasesLengthA
EnumDateFormatsW
GetProfileIntA
InterlockedPopEntrySList
GetCommandLineA
GetStartupInfoA
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
ReadFile
TerminateProcess
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
RtlUnwind
MultiByteToWideChar
GetConsoleMode
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoA
GetStringTypeW
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
CloseHandle
user32
GetAltTabInfoW
advapi32
AdjustTokenPrivileges
MapGenericMask
AreAllAccessesGranted
AdjustTokenGroups
Exports
Exports
@GetFirstVice@0
@GetVice@0
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13.5MB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ