C:\telurayutejaxe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a168a28d9efe610e2f4466e863e4d3e3a73984728a8edcce975057b7508db9aa.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
a168a28d9efe610e2f4466e863e4d3e3a73984728a8edcce975057b7508db9aa.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
a168a28d9efe610e2f4466e863e4d3e3a73984728a8edcce975057b7508db9aa.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
a168a28d9efe610e2f4466e863e4d3e3a73984728a8edcce975057b7508db9aa.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
a168a28d9efe610e2f4466e863e4d3e3a73984728a8edcce975057b7508db9aa.exe
Resource
win11-20240412-en
General
-
Target
a168a28d9efe610e2f4466e863e4d3e3a73984728a8edcce975057b7508db9aa
-
Size
1.9MB
-
MD5
297dae8a9e4c29c6e27cad5884e6bbf0
-
SHA1
6bbe3a8f9c843838daac183069a9fe166e156b92
-
SHA256
a168a28d9efe610e2f4466e863e4d3e3a73984728a8edcce975057b7508db9aa
-
SHA512
83fb601752ba0072e64f2fa04fc3c45bdbe37728975eb3adbcff743e4dcaf7faf36e4100338e96114ef2ca396ab658c675129244a2fa64e9d9c733ad4c36fed1
-
SSDEEP
49152:c9+v9qBhn3hRk9XkSxV4QFTNXopKJe8FtU+0:ywqBZTk9X7bFTSphIK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a168a28d9efe610e2f4466e863e4d3e3a73984728a8edcce975057b7508db9aa
Files
-
a168a28d9efe610e2f4466e863e4d3e3a73984728a8edcce975057b7508db9aa.exe windows:5 windows x86 arch:x86
26174cd618191e0f458fd2f9d0ece6c1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TlsGetValue
SetLocalTime
GetConsoleAliasExesLengthA
FindResourceW
GlobalAddAtomA
GetConsoleAliasA
InitializeSListHead
CreateJobObjectW
SetComputerNameW
GetModuleHandleW
CreateNamedPipeW
GetConsoleAliasesA
GetWindowsDirectoryA
GetGeoInfoW
LoadLibraryW
ReadConsoleInputA
GetSystemWindowsDirectoryA
GetNamedPipeInfo
CreateFileW
GetVolumePathNameA
GetLastError
SetLastError
GetComputerNameA
VirtualAlloc
EnumDateFormatsExA
RemoveDirectoryA
SearchPathA
GetPrivateProfileStringA
OpenWaitableTimerW
LocalAlloc
CreateFileMappingW
GetNumberFormatW
SetConsoleWindowInfo
GetSystemInfo
GlobalFindAtomW
FindFirstVolumeMountPointA
FreeEnvironmentStringsW
EndUpdateResourceA
ReadConsoleInputW
GetWindowsDirectoryW
GetCurrentProcessId
GetConsoleProcessList
DebugActiveProcess
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
CloseHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetStdHandle
FlushFileBuffers
HeapSize
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
user32
GetMessageExtraInfo
CharToOemBuffA
gdi32
GetCharWidth32A
GetCharABCWidthsFloatW
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 714KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ