C:\hexuva_cikucoxeveditede\yuyoyinojet91 t.pdb
Static task
static1
Behavioral task
behavioral1
Sample
10d2acf2624e52b9dd5f5a78b14bcdf7728bb9ef76f90008f622a5381d555952.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10d2acf2624e52b9dd5f5a78b14bcdf7728bb9ef76f90008f622a5381d555952.exe
Resource
win10v2004-20240412-en
General
-
Target
150706758889bd0ae457f71a1160ae96824ef0001cbce53545994a253310b4b5
-
Size
541KB
-
MD5
9664cc3a65a642349367d2941b02c00b
-
SHA1
a1dd859b1d9671907f6cc95b2749a87471bba13c
-
SHA256
150706758889bd0ae457f71a1160ae96824ef0001cbce53545994a253310b4b5
-
SHA512
872713c93f9ba716fd6e2b7df3068bda28ac12b102c68ebc436dd1dbd81227d972ce8b425dcefb34c3827d885b4b48834cd94c7d9bbe14a78bc5d1f8f23d86db
-
SSDEEP
12288:5QfGxYnqMeYGdQkn1RwLXJHeM+Rzv/Vv2ryjRwPAP:hqeYeQW1MJH6/VOryjqW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/10d2acf2624e52b9dd5f5a78b14bcdf7728bb9ef76f90008f622a5381d555952.exe
Files
-
150706758889bd0ae457f71a1160ae96824ef0001cbce53545994a253310b4b5.zip
Password: infected
-
10d2acf2624e52b9dd5f5a78b14bcdf7728bb9ef76f90008f622a5381d555952.exe.exe windows:5 windows x86 arch:x86
ae449b68f65db2bf40f2427fdc3b778e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTickCount
FindNextVolumeMountPointA
EnumTimeFormatsW
GetUserGeoID
GetProcessTimes
IsBadStringPtrA
SetConsoleTitleA
WritePrivateProfileStringW
GetLastError
GetUserDefaultLCID
GetTapeStatus
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
GetTapeParameters
GlobalAddAtomW
GetTempPathA
OpenFileMappingA
LocalFree
LCMapStringW
GetCurrentProcess
HeapAlloc
DebugActiveProcessStop
lstrlenA
GetProcAddress
SetProcessAffinityMask
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
IsProcessorFeaturePresent
Sleep
HeapSize
GetModuleHandleW
ExitProcess
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
LoadLibraryW
RtlUnwind
GetStringTypeW
SetStdHandle
WriteConsoleW
MultiByteToWideChar
FlushFileBuffers
CreateFileW
CloseHandle
ReadFile
advapi32
SetSecurityDescriptorSacl
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 471KB - Virtual size: 471KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 22.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ