C:\kejape\siyutukafowex 9.pdb
Static task
static1
Behavioral task
behavioral1
Sample
def068a1136728af31342c71582b1a85.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
def068a1136728af31342c71582b1a85.exe
Resource
win10v2004-20240226-en
General
-
Target
def068a1136728af31342c71582b1a85
-
Size
13.1MB
-
MD5
def068a1136728af31342c71582b1a85
-
SHA1
d61c7e1a928c76403ae590f8380150d0dfe572b9
-
SHA256
bad8cfc47d63460e56554bdffe7e3cd7f8d8f4acd077c1846812ddab9a13b3d6
-
SHA512
2d1d7404ef3f6f5d2bbf4d60505701b2a041d8f9e5f0460cdb84c1e278a4cd705b83ad1dab5e2914d04542b32dbfafe1f73a290a76324b2e4d6fa1a662624264
-
SSDEEP
6144:ynqXDHjKw5RZmN+RrjeO6wWSLL78/nk5agPEWHtIhiiiiiiiiiiiiiiiiiiiiiiH:vXbjKw5bmN+RPWcLI/niag8E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource def068a1136728af31342c71582b1a85
Files
-
def068a1136728af31342c71582b1a85.exe windows:5 windows x86 arch:x86
0e61e5ee811a73c290e64659dd192375
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetVolumeLabelA
OpenFile
SetLocalTime
SetEndOfFile
GetNumberOfConsoleInputEvents
GetCommState
InterlockedDecrement
ScrollConsoleScreenBufferW
GetProfileSectionA
WriteConsoleInputA
SetComputerNameW
GetComputerNameW
CreateDirectoryExA
CallNamedPipeW
GetModuleHandleW
GenerateConsoleCtrlEvent
GetSystemWow64DirectoryA
EnumResourceTypesA
GetDriveTypeA
TlsSetValue
FindResourceExA
GlobalAlloc
AddRefActCtx
GetVolumeInformationA
Sleep
ReadFileScatter
GetConsoleWindow
GetSystemTimeAdjustment
GetVersionExW
InterlockedPopEntrySList
GlobalFlags
Beep
VerifyVersionInfoA
GetBinaryTypeA
TerminateProcess
ReadFile
CompareStringW
lstrlenW
SetConsoleTitleA
GlobalUnlock
GetConsoleOutputCP
EnumResourceNamesW
InterlockedExchange
GetFileSizeEx
GetStdHandle
FindFirstFileA
IsDBCSLeadByteEx
GetProcAddress
WriteProfileSectionA
FreeUserPhysicalPages
CreateMemoryResourceNotification
SearchPathA
GetPrivateProfileStringA
SetFileApisToOEM
GetAtomNameA
Process32FirstW
OpenMutexA
OpenWaitableTimerW
SetCalendarInfoW
IsSystemResumeAutomatic
GetCommMask
AddAtomA
GetSystemInfo
GetOEMCP
SetConsoleCursorInfo
CreateIoCompletionPort
WaitCommEvent
GetModuleHandleA
FreeEnvironmentStringsW
GetConsoleTitleW
BuildCommDCBA
GetCurrentDirectoryA
CompareStringA
GetWindowsDirectoryW
GetCurrentProcessId
LCMapStringW
CopyFileExA
DeleteFileA
CreateFileA
CreateDirectoryA
GetCommandLineW
GetLastError
MoveFileA
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
InterlockedIncrement
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsFree
SetLastError
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
RtlUnwind
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
LoadLibraryA
WideCharToMultiByte
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
SetStdHandle
WriteConsoleA
user32
GetMenuBarInfo
GetMenuInfo
GetComboBoxInfo
GetMenuCheckMarkDimensions
advapi32
InitiateSystemShutdownA
Exports
Exports
_CallPattern@8
_futurama@4
_zabiray@8
Sections
.text Size: 211KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12.8MB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ