C:\buvuha\tapocuxokigel3_je.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe
Resource
win11-20240419-en
General
-
Target
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81
-
Size
1.9MB
-
MD5
c4ee55c8f75cf73eb54594775e06a94a
-
SHA1
3604f680c80cd43621ca45dc911e61e14cf24cb6
-
SHA256
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81
-
SHA512
f13b63c25aba363d81f98ed3a14808f64865ba13f1956adffd0f5202a20c2c51a294519e030d079fa5825a88cf6066ad13db4257c00eadfa873a55b2c4acbc18
-
SSDEEP
49152:d/bZlebN53l9AsH7yGkm0IP9C/+7iNQXf3DLXrvjA:Ubn3zAu7l50SC2+CTT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81
Files
-
ceaab53560fe27d25ae139dd736a26f32daf3a1b3ce8410c1153a422205dea81.exe windows:5 windows x86 arch:x86
7d66baab7ba12b7674f6cb85612ff1be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VirtualQuery
GetDefaultCommConfigW
SetWaitableTimer
GetCommState
GetConsoleAliasA
InterlockedDecrement
GetLogicalDriveStringsW
CreateJobObjectW
InterlockedCompareExchange
AddConsoleAliasW
WaitForSingleObjectEx
GetProcessPriorityBoost
GetTickCount
IsBadReadPtr
GetConsoleAliasesLengthA
GetConsoleTitleA
GetWindowsDirectoryA
CancelDeviceWakeupRequest
WriteFile
CreateActCtxW
InitializeCriticalSection
GlobalAlloc
GetLocaleInfoW
FatalAppExitW
_hread
GetSystemWindowsDirectoryA
GetVersionExW
GetStringTypeExW
GlobalFlags
AllocConsole
FindNextVolumeW
MulDiv
ReplaceFileW
IsDBCSLeadByte
GetModuleFileNameW
GetStdHandle
OpenMutexW
GetLastError
ReadConsoleOutputCharacterA
GetProcAddress
AttachConsole
VirtualAlloc
GetTempFileNameA
LoadLibraryA
DnsHostnameToComputerNameA
CreateFileMappingW
IsSystemResumeAutomatic
GetTapeParameters
FindFirstVolumeMountPointA
GetModuleHandleA
GetConsoleTitleW
WaitForDebugEvent
SetProcessShutdownParameters
_lopen
FindAtomW
GetFileInformationByHandle
AddConsoleAliasA
PeekNamedPipe
lstrlenA
WritePrivateProfileStructW
SetThreadContext
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
user32
CharLowerBuffW
gdi32
GetCharWidthW
EnumFontsA
GetCharABCWidthsFloatW
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ