C:\yiwapixa kahowiyezica58_sud19_giy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d7ab863d975aa91a308fda785cd1a5f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7ab863d975aa91a308fda785cd1a5f5.exe
Resource
win10v2004-20240226-en
General
-
Target
d7ab863d975aa91a308fda785cd1a5f5
-
Size
12.8MB
-
MD5
d7ab863d975aa91a308fda785cd1a5f5
-
SHA1
59df1cbcb8ecc485dee59cbc9fa54aca9a5cb9e7
-
SHA256
9c4e7e27dd56099f8a4879fc5288ae49ebac230f98613f10a034637cd101c145
-
SHA512
973734dea770960aa9006d6fefba40e7ef8d8615f05ac83ce5787af2a2acad0bf6731b10a72ca1e158c6261d5bcfc1afcc7f619214109c8dd648baacc0d8a208
-
SSDEEP
24576:lT8rgnPp+RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRh:Lp+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7ab863d975aa91a308fda785cd1a5f5
Files
-
d7ab863d975aa91a308fda785cd1a5f5.exe windows:5 windows x86 arch:x86
f9171e3fceb6d8c6fb81cb999790f0d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnumResourceNamesW
SearchPathW
FindFirstFileW
TlsGetValue
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
FindResourceExW
CallNamedPipeA
InterlockedIncrement
InitializeSListHead
SetComputerNameW
GetComputerNameW
CreateDirectoryExA
GetCommProperties
FreeEnvironmentStringsA
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasesLengthA
GetPrivateProfileStringW
GetConsoleTitleA
GetCommandLineA
GetSystemWow64DirectoryA
EnumResourceTypesA
GlobalAlloc
AddRefActCtx
GetVolumeInformationA
Sleep
ReadFileScatter
GetConsoleWindow
GetSystemTimeAdjustment
GetVersionExW
GlobalFlags
GetBinaryTypeA
TerminateProcess
GetAtomNameW
IsDBCSLeadByte
ReadFile
CompareStringW
lstrlenW
SetConsoleTitleA
GlobalUnlock
LCMapStringA
VerifyVersionInfoW
CreateDirectoryA
InterlockedExchange
GetFileSizeEx
GetCurrentDirectoryW
GetProcAddress
SetVolumeLabelW
FreeUserPhysicalPages
BuildCommDCBW
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
OpenMutexA
SetCalendarInfoW
SetConsoleOutputCP
AddAtomW
SetFileApisToANSI
WriteProfileSectionW
GetTapeParameters
GetSystemInfo
GetOEMCP
CreateIoCompletionPort
FreeEnvironmentStringsW
FindNextFileW
RequestWakeupLatency
GetConsoleCursorInfo
ScrollConsoleScreenBufferA
GetWindowsDirectoryW
GetProfileSectionW
CopyFileExA
DeleteFileA
GetLastError
MoveFileA
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
LeaveCriticalSection
EnterCriticalSection
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedDecrement
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetFilePointer
RtlUnwind
DebugBreak
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
GetModuleHandleA
user32
GetMenuCheckMarkDimensions
GetMenuInfo
GetMenuBarInfo
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12.5MB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ