C:\xofez.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b02c420e6f8a977cd254cd69281a7e8ce8026bda3fc594e1fc550c3b5e41565d.exe
Resource
win7-20240221-en
General
-
Target
b02c420e6f8a977cd254cd69281a7e8ce8026bda3fc594e1fc550c3b5e41565d
-
Size
738KB
-
MD5
2a211218afa6a34db27c1ac6f6ba3390
-
SHA1
92fa9d3de5d976391e2dc3ca6fcf053ae072b654
-
SHA256
b02c420e6f8a977cd254cd69281a7e8ce8026bda3fc594e1fc550c3b5e41565d
-
SHA512
f1670eea3d60a85bd78be9258a9cf1d4dd1949f95e97c15907f7856de78d89b53404c3fa2e5de8d3fb9bb2d4d7769131d930debedd40101c00c376f58a87cbb6
-
SSDEEP
12288:rdIJ/T1mCBE/sARyzDcvF6upOexPNLUKVlyiLpXvyw4eg5pfuwalb2I:r0/THey/0F/pLPLUKP3LpXvy/XJalbZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b02c420e6f8a977cd254cd69281a7e8ce8026bda3fc594e1fc550c3b5e41565d
Files
-
b02c420e6f8a977cd254cd69281a7e8ce8026bda3fc594e1fc550c3b5e41565d.exe windows:5 windows x86 arch:x86
9cf3a49690219b7af90de93ade706bf3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetPrivateProfileSectionNamesW
GetFileSize
SearchPathW
SetPriorityClass
OpenFile
WriteConsoleInputW
SetFilePointer
GetConsoleAliasesLengthW
TlsGetValue
GetDriveTypeW
FindResourceExW
LoadResource
HeapAlloc
SystemTimeToFileTime
GetCommState
ZombifyActCtx
WritePrivateProfileSectionA
GetProfileStringW
SignalObjectAndWait
SetComputerNameW
OpenSemaphoreA
GetWindowsDirectoryA
EnumTimeFormatsA
GetCommandLineA
GetSystemWow64DirectoryA
SetProcessPriorityBoost
GlobalAlloc
LoadLibraryW
GetConsoleMode
TerminateThread
GetPrivateProfileStructW
GetSystemPowerStatus
SetVolumeMountPointA
GlobalFlags
WritePrivateProfileStructW
SetConsoleMode
GetFileAttributesW
SetTimeZoneInformation
HeapQueryInformation
TerminateProcess
GetBinaryTypeW
GetACP
lstrlenW
SetThreadPriority
RaiseException
CreateJobObjectA
GetPrivateProfileIntW
FindFirstFileExA
GetLastError
IsDBCSLeadByteEx
GetCurrentDirectoryW
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
MoveFileW
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
OpenMutexA
WriteConsoleA
ProcessIdToSessionId
BuildCommDCBAndTimeoutsW
IsSystemResumeAutomatic
SetConsoleOutputCP
AddAtomW
WriteProfileSectionW
GetCommMask
GetCurrentConsoleFont
FindAtomA
WaitForMultipleObjects
SetSystemTime
SetConsoleCursorInfo
DebugSetProcessKillOnExit
GetProcessShutdownParameters
ContinueDebugEvent
CancelTimerQueueTimer
EnumResourceNamesA
RequestWakeupLatency
ScrollConsoleScreenBufferA
ReleaseMutex
AddConsoleAliasA
DebugBreak
GetProfileSectionW
CopyFileExA
GetVolumeInformationW
lstrcpyA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
DeleteFileA
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
GetModuleFileNameW
IsProcessorFeaturePresent
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetFileType
WriteFile
GetConsoleCP
HeapValidate
IsBadReadPtr
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapCreate
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
HeapSize
HeapFree
CreateFileW
CloseHandle
FlushFileBuffers
user32
GetCursorInfo
Sections
.text Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 509KB - Virtual size: 529KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pare Size: 1024B - Virtual size: 741B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ