C:\fogofame\nejokiv\nonemikocul89\buwogodixav\pesaw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
81abe114f2705442851eb956c00a15a6c7e32674786a01b354575c08a5eb0ea0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81abe114f2705442851eb956c00a15a6c7e32674786a01b354575c08a5eb0ea0.exe
Resource
win10v2004-20240319-en
General
-
Target
81abe114f2705442851eb956c00a15a6c7e32674786a01b354575c08a5eb0ea0
-
Size
12.0MB
-
MD5
a537a324c7bb5b25810322a7b066f088
-
SHA1
992a4e0a88a7879a6a7bd3c0fad7309894d925d2
-
SHA256
81abe114f2705442851eb956c00a15a6c7e32674786a01b354575c08a5eb0ea0
-
SHA512
6cf362140f5876f58f5ab8d384629a65d1dbea034fa17423091354b41958daaca5f2762e44a8fb046945b9fa6b05e072d827c63b909d03addbe7ca22e983b2ed
-
SSDEEP
24576:m+TrckDxmioe9cccccccccccccccccccccccccccccccccccccccccccccccccco:Zl8e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 81abe114f2705442851eb956c00a15a6c7e32674786a01b354575c08a5eb0ea0
Files
-
81abe114f2705442851eb956c00a15a6c7e32674786a01b354575c08a5eb0ea0.exe windows:5 windows x86 arch:x86
02b8c0715a2ee9075227bc28cc3779b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ZombifyActCtx
GetConsoleAliasesLengthW
GetVersionExW
GetConsoleOutputCP
GetDefaultCommConfigA
FindFirstFileExA
GetDriveTypeW
FreeEnvironmentStringsW
SetProcessPriorityBoost
FindNextVolumeA
SetCurrentDirectoryA
GetLongPathNameA
TlsSetValue
SetComputerNameExA
FindAtomW
BuildCommDCBAndTimeoutsA
VirtualProtect
GetModuleHandleA
GlobalAlloc
InitializeCriticalSection
TlsGetValue
GetCommandLineW
InterlockedDecrement
GetCalendarInfoA
CopyFileA
OutputDebugStringW
SetSystemTimeAdjustment
GetPriorityClass
WritePrivateProfileStringW
GetProcessHeaps
GlobalWire
HeapCompact
GetStartupInfoA
GetDiskFreeSpaceExA
GetCPInfoExA
GetWindowsDirectoryW
GetSystemWow64DirectoryA
SetLastError
WriteProfileSectionW
GetCalendarInfoW
GetProfileStringA
SetConsoleCursorPosition
GetLastError
DeleteVolumeMountPointW
ContinueDebugEvent
WriteFile
GetNumberOfConsoleInputEvents
GetSystemWindowsDirectoryW
GlobalFindAtomA
FindNextChangeNotification
CreateActCtxA
GetMailslotInfo
GetPrivateProfileIntA
_lread
DefineDosDeviceA
SetVolumeMountPointA
EndUpdateResourceA
WriteConsoleW
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GetPrivateProfileStructA
TryEnterCriticalSection
GetPrivateProfileSectionNamesW
GetFileAttributesExW
LocalFileTimeToFileTime
MoveFileW
GetVolumePathNameA
TerminateProcess
lstrcmpW
GetComputerNameA
FindActCtxSectionStringA
GetThreadContext
MoveFileExA
GetProcAddress
GlobalCompact
UnregisterWait
BuildCommDCBW
GlobalDeleteAtom
GetShortPathNameW
OpenEventA
SetCommTimeouts
WaitNamedPipeW
CreateIoCompletionPort
GetPrivateProfileSectionNamesA
FindResourceExW
GetSystemTimeAsFileTime
GetSystemInfo
FreeEnvironmentStringsA
GetLocalTime
OpenSemaphoreA
WriteProfileStringA
SetFileShortNameW
lstrcpyW
VerLanguageNameW
GetThreadSelectorEntry
GetSystemTime
UnlockFile
GetConsoleCP
GetConsoleAliasA
SetConsoleScreenBufferSize
GetAtomNameA
WriteConsoleInputW
CreateMailslotA
SetCommState
SetHandleCount
_lopen
ResetWriteWatch
ClearCommBreak
GetModuleHandleW
GetOverlappedResult
EnumDateFormatsA
GetConsoleAliasExesLengthW
WriteConsoleOutputCharacterA
HeapFree
OpenMutexW
GetStringTypeW
SetFilePointer
PostQueuedCompletionStatus
AreFileApisANSI
OpenWaitableTimerW
GetCurrentProcess
PeekNamedPipe
GetCompressedFileSizeW
FindNextVolumeMountPointA
GetFullPathNameA
WriteProfileStringW
InitAtomTable
GlobalAddAtomW
TerminateJobObject
SetFirmwareEnvironmentVariableA
GetBinaryTypeW
LeaveCriticalSection
QueryDosDeviceW
HeapSetInformation
CreateNamedPipeA
InterlockedIncrement
Sleep
DeleteCriticalSection
EnterCriticalSection
RaiseException
RtlUnwind
MoveFileA
GetCommandLineA
HeapValidate
IsBadReadPtr
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
IsDebuggerPresent
TlsAlloc
GetCurrentThreadId
TlsFree
CloseHandle
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
ExitProcess
GetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
DebugBreak
OutputDebugStringA
LoadLibraryW
InitializeCriticalSectionAndSpinCount
SetStdHandle
MultiByteToWideChar
GetStringTypeA
LCMapStringA
LCMapStringW
GetLocaleInfoA
LoadLibraryA
WriteConsoleA
CreateFileA
user32
OemToCharA
advapi32
GetFileSecurityW
msimg32
AlphaBlend
Sections
.text Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vunozex Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11.7MB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ