C:\duzalicovari\jayabebewuhopu\kixakewavep17-ruwaya mu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
58439dcc59f801b60ab3fda64fd1a5e3ae1a0de95dec6abff06e047603187ea1.exe
Resource
win7-20240708-en
General
-
Target
58439dcc59f801b60ab3fda64fd1a5e3ae1a0de95dec6abff06e047603187ea1.zip
-
Size
120KB
-
MD5
c04533662d0b6566033422bd6f00490c
-
SHA1
7a15e933dc2d795e7ac551f14be68f807fc04e29
-
SHA256
99ae284534c8928e33330aa2c20dfa8445dc8189dbabff80cabf8606609d3afd
-
SHA512
246ba499b95cb7ef3ef93c522c41cb37a2ba8ed6d204b14e5fb81ed8239d91e074bd159685d95cb7523bf8ce757239d7503802a940e63863428195932fe94806
-
SSDEEP
3072:EeZWVUvEUzYf0oRwTqLMQ4baYpcPm8SUCuytn9amJt:EeZ78QYf0ewmLMRaYieUFyt9amX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/58439dcc59f801b60ab3fda64fd1a5e3ae1a0de95dec6abff06e047603187ea1.exe
Files
-
58439dcc59f801b60ab3fda64fd1a5e3ae1a0de95dec6abff06e047603187ea1.zip.zip
Password: infected
-
58439dcc59f801b60ab3fda64fd1a5e3ae1a0de95dec6abff06e047603187ea1.exe.exe windows:5 windows x86 arch:x86
Password: infected
98af1336ee9a8378f1e2c2d0d9027760
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
GetConsoleAliasesLengthW
SetConsoleTextAttribute
MoveFileExW
SetMailslotInfo
CreateDirectoryExA
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesA
GetConsoleTitleA
ReadConsoleW
CreateDirectoryExW
InitializeCriticalSection
WriteConsoleW
ReplaceFileW
GetBinaryTypeW
SetFilePointer
GetStdHandle
GetCPInfoExW
GetLastError
VirtualAlloc
MoveFileW
WriteProfileSectionA
LoadLibraryA
GetProcessWorkingSetSize
LocalAlloc
SetCalendarInfoW
FindFirstChangeNotificationA
VirtualProtect
InterlockedPushEntrySList
UnregisterWait
HeapFree
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
HeapReAlloc
Sleep
GetProcAddress
ExitProcess
WriteFile
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
Sections
.text Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 290KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�]�0�u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE