C:\soj.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e10ffbe71bdc15144ad89672cebb1bf3.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e10ffbe71bdc15144ad89672cebb1bf3.exe
Resource
win10v2004-20240226-en
General
-
Target
e10ffbe71bdc15144ad89672cebb1bf3
-
Size
10.6MB
-
MD5
e10ffbe71bdc15144ad89672cebb1bf3
-
SHA1
4e6201d65209e419a4370f0acaa840ec52819dee
-
SHA256
6639002556711a082dae6122ae5ea47e23b19cfd8364f79882ae09a9d435565d
-
SHA512
60a60e077c863359b7fd2b5de7cd3977605ab4ab7f50525d277cd7a5e72a9dc69d717537ef6d5814b2cb8d6da26f87e2b5fdfa398cc6bbf7a86b974dac6c9f3d
-
SSDEEP
49152:Qc67ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff:Qc6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e10ffbe71bdc15144ad89672cebb1bf3
Files
-
e10ffbe71bdc15144ad89672cebb1bf3.exe windows:5 windows x86 arch:x86
24d4aae6dda34371187af9a3d123ea16
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetVolumeLabelA
CreateFileA
GlobalDeleteAtom
FindFirstFileW
lstrlenA
TlsGetValue
GetStringTypeA
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
MapUserPhysicalPages
CallNamedPipeA
InterlockedIncrement
InterlockedDecrement
ScrollConsoleScreenBufferW
WritePrivateProfileSectionA
CreateDirectoryW
WaitForSingleObject
WriteConsoleInputA
SignalObjectAndWait
SetVolumeMountPointW
OpenSemaphoreA
FreeEnvironmentStringsA
GetModuleHandleW
GetPrivateProfileStringW
GetConsoleTitleA
SetCommState
WriteFileGather
CreateDirectoryExW
FindResourceExA
AddRefActCtx
GetPrivateProfileStructW
GetSystemTimeAdjustment
GlobalFlags
GetComputerNameExA
Beep
SetMessageWaitingIndicator
VerifyVersionInfoA
GetBinaryTypeA
GetAtomNameW
ReadFile
CompareStringW
GetACP
LCMapStringA
HeapReAlloc
SetCurrentDirectoryA
IsDBCSLeadByteEx
GetProcAddress
SetStdHandle
SetComputerNameA
CreateMemoryResourceNotification
GetPrivateProfileStringA
SetFileApisToOEM
OpenWaitableTimerA
Process32FirstW
OpenMutexA
LocalAlloc
SetCalendarInfoW
GetFileType
SetConsoleOutputCP
QueryDosDeviceW
WriteProfileSectionW
GetCommMask
AddAtomA
SetCommMask
EnumResourceTypesW
SetConsoleCursorInfo
GetThreadPriority
SetConsoleTitleW
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
RequestWakeupLatency
BuildCommDCBA
GetCurrentDirectoryA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
FindActCtxSectionStringW
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
GetProfileSectionW
GetVolumeInformationW
IsProcessorFeaturePresent
FlushFileBuffers
CloseHandle
CreateFileW
HeapFree
InterlockedExchange
FileTimeToDosDateTime
GetLastError
MoveFileA
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
GetStartupInfoW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetModuleFileNameW
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
DeleteCriticalSection
HeapValidate
IsBadReadPtr
HeapCreate
WriteConsoleW
SetFilePointer
RtlUnwind
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
GetStringTypeW
LCMapStringW
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
RaiseException
user32
GetCursorInfo
GetMenuInfo
GetComboBoxInfo
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.3MB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ