C:\code\pc\ytjsq\ReleaseZip\Yuutto.pdb
Static task
static1
Behavioral task
behavioral1
Sample
04f632d806e97be670c2e9d55d489a0068659624eee2907efa8a351635231b11.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
04f632d806e97be670c2e9d55d489a0068659624eee2907efa8a351635231b11.exe
Resource
win10v2004-20240508-en
General
-
Target
04f632d806e97be670c2e9d55d489a0068659624eee2907efa8a351635231b11
-
Size
1.6MB
-
MD5
dec462150516c1d6d4963a0b88e6b084
-
SHA1
3fca3bf41decfad7785056dd0e81b16851cf0087
-
SHA256
04f632d806e97be670c2e9d55d489a0068659624eee2907efa8a351635231b11
-
SHA512
65bc61985792e79e6a76957f83bad0db5f38eaaf0ff4de7c1b463c00d30776569814e27d7a82252124c4f4abd0cb200c3944428adfec1004d0e60a461fff28ec
-
SSDEEP
24576:PrdEu1wtDZoqAf4Fsm0xud9r8Q972wSkDc0QF72RCLD6y:euqD+Zf4FRiud9r8syRi/QF72RCLD6y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04f632d806e97be670c2e9d55d489a0068659624eee2907efa8a351635231b11
Files
-
04f632d806e97be670c2e9d55d489a0068659624eee2907efa8a351635231b11.exe windows:6 windows x86 arch:x86
58762446928ba50bcba86bedeac5bc63
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
windivert
WinDivertClose
WinDivertHelperCalcChecksums
WinDivertHelperParsePacket
WinDivertOpen
WinDivertRecv
WinDivertSend
kernel32
GetCurrentProcessId
GetCurrentThread
GetSystemTimeAsFileTime
GetLocalTime
VirtualQuery
GetModuleFileNameW
GetModuleHandleW
FormatMessageW
MoveFileW
WideCharToMultiByte
WriteConsoleW
GetEnvironmentVariableW
GetCurrentDirectoryW
OutputDebugStringW
GetCurrentThreadId
SuspendThread
ResumeThread
GetThreadId
GetThreadContext
FreeLibrary
GetProcAddress
LoadLibraryW
MultiByteToWideChar
CreateDirectoryW
SetUnhandledExceptionFilter
CreateIoCompletionPort
GetQueuedCompletionStatus
EnterCriticalSection
LeaveCriticalSection
ReleaseMutex
WaitForSingleObject
CreateMutexW
CreateEventW
TerminateProcess
CreateThread
CreateProcessW
OpenProcess
GetSystemInfo
FindResourceExW
LoadResource
LockResource
SizeofResource
LocalFree
FindResourceW
GetPrivateProfileStringW
WritePrivateProfileStringW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetExitCodeProcess
TerminateThread
SetEvent
ResetEvent
CreatePipe
Sleep
GetStartupInfoW
PostQueuedCompletionStatus
SystemTimeToFileTime
GetOverlappedResult
DeviceIoControl
CancelIoEx
GetTickCount
GetCurrentProcess
GetPrivateProfileIntW
GlobalMemoryStatusEx
GetVersionExW
GlobalMemoryStatus
lstrcmpiW
FindClose
FindFirstFileW
FindNextFileW
RemoveDirectoryW
GetSystemDefaultLCID
GetComputerNameW
IsValidLocale
GetACP
GetModuleHandleExW
ExitProcess
LoadLibraryExW
RtlUnwind
QueryPerformanceFrequency
GetSystemTime
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
EncodePointer
InitializeSListHead
QueryPerformanceCounter
IsDebuggerPresent
WaitForSingleObjectEx
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetOEMCP
GetCommandLineA
GetCommandLineW
InitializeCriticalSection
CloseHandle
WriteFile
SetFilePointer
SetFileAttributesW
SetEndOfFile
ReadFile
GetFileSize
GetFileAttributesW
FindFirstFileExW
DeleteFileW
CreateFileW
GetStdHandle
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
SetStdHandle
SetFilePointerEx
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
DecodePointer
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
ReadConsoleW
GetConsoleCP
GetConsoleMode
IsValidCodePage
GetNativeSystemInfo
user32
IsWindow
UpdateWindow
LoadCursorW
LoadIconW
IsWindowVisible
GetKeyState
CreateWindowExW
CreatePopupMenu
DestroyMenu
AppendMenuW
TrackPopupMenu
RegisterClassW
PostQuitMessage
DefWindowProcW
SendMessageTimeoutW
SendMessageW
FindWindowW
MessageBoxW
SetForegroundWindow
SetTimer
IsIconic
ShowWindow
PostMessageW
DispatchMessageW
TranslateMessage
GetCursorPos
DestroyWindow
GetWindowThreadProcessId
GetMessageW
SetWindowPos
KillTimer
GetSystemMetrics
SetWindowLongW
GetWindowLongW
MessageBoxA
SetFocus
GetWindowRect
SetWindowTextW
MoveWindow
gdi32
GetStockObject
advapi32
RegOpenKeyExA
GetUserNameW
RegCloseKey
RegEnumKeyA
CryptAcquireContextW
CryptReleaseContext
CryptGenRandom
SystemFunction036
RegEnumKeyExA
RegQueryValueExA
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyW
RegSetValueExW
RegDeleteValueW
shell32
ExtractIconExW
ShellExecuteA
Shell_NotifyIconW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
ole32
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
ws2_32
getaddrinfo
getsockname
WSACreateEvent
WSACloseEvent
send
recv
ioctlsocket
connect
WSASocketW
WSASend
WSARecv
WSAGetLastError
gethostname
inet_ntop
WSAIoctl
WSAStartup
gethostbyname
socket
shutdown
setsockopt
sendto
select
recvfrom
ntohs
ntohl
inet_ntoa
inet_addr
htons
htonl
closesocket
bind
freeaddrinfo
__WSAFDIsSet
mprapi
MprConfigGetFriendlyName
MprConfigServerDisconnect
MprConfigServerConnect
iphlpapi
CreateIpForwardEntry
GetAdaptersInfo
NotifyAddrChange
DeleteIpForwardEntry
FlushIpNetTable
GetAdapterIndex
GetAdaptersAddresses
GetIpForwardTable
GetExtendedUdpTable
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
dbghelp
SymSetOptions
UnDecorateSymbolName
SymGetSymFromAddr64
SymInitialize
SymGetLineFromAddr64
SymGetModuleBase64
SymGetModuleInfo64
SymFunctionTableAccess64
SymCleanup
SymGetOptions
StackWalk64
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 250KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 291KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ