C:\satuhuy15_miyotisoy_huyag_f.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2ecdac220249b69a103a73a3a3d1f450N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2ecdac220249b69a103a73a3a3d1f450N.exe
Resource
win10v2004-20240802-en
General
-
Target
2ecdac220249b69a103a73a3a3d1f450N.exe
-
Size
394KB
-
MD5
2ecdac220249b69a103a73a3a3d1f450
-
SHA1
cc00bbd208c17b66339ff34e3848c0b9f0c67fa4
-
SHA256
9b1a0d63c7ab084c006aa4c7d7ed7c43ebaa5455ba9630f152d8c46f5e1a553b
-
SHA512
2b900a2b9c13db5c1e2d7cbcb218eb8f4656c3d93c06d44ad9674a7e1f4f353a626838bdb250f109bf4c0f6d40f8d86d1d83d8bdad1004ec2f5ff2f3eab29b43
-
SSDEEP
12288:aLw1pykL6YwD3ya7UBw/pdAfMggXrVzeO:aVkL6YwD39ympGfMnBz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2ecdac220249b69a103a73a3a3d1f450N.exe
Files
-
2ecdac220249b69a103a73a3a3d1f450N.exe.exe windows:5 windows x86 arch:x86
69796319581eefd1bf04ebc85dc27d68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLangID
ExitProcess
GetCommandLineW
GetPrivateProfileSectionNamesW
GlobalFix
SearchPathW
OpenFile
lstrlenA
WritePrivateProfileStructA
CopyFileExW
GetDriveTypeW
DebugActiveProcessStop
SetEndOfFile
BuildCommDCBAndTimeoutsA
LoadResource
SystemTimeToTzSpecificLocalTime
DeleteVolumeMountPointA
ScrollConsoleScreenBufferW
SetConsoleActiveScreenBuffer
SetHandleInformation
GetProfileStringW
GetProfileSectionA
GetUserDefaultLCID
SetComputerNameW
AddConsoleAliasW
FlushConsoleInputBuffer
GetProcessPriorityBoost
IsBadReadPtr
EnumTimeFormatsW
TlsSetValue
GlobalAlloc
GetPrivateProfileIntA
GetVolumeInformationA
LoadLibraryW
GetConsoleMode
GetSystemPowerStatus
GlobalFlags
HeapCreate
GetFileAttributesW
WriteConsoleW
GetBinaryTypeA
GetAtomNameW
GetTimeZoneInformation
GetConsoleFontSize
GetOverlappedResult
DisconnectNamedPipe
RaiseException
DeactivateActCtx
CreateJobObjectA
GetConsoleOutputCP
VerifyVersionInfoW
FreeLibraryAndExitThread
OpenMutexW
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
VirtualAlloc
CreateNamedPipeA
SetVolumeLabelW
LocalLock
GetConsoleDisplayMode
SetComputerNameA
EnterCriticalSection
GetTempFileNameA
GetLocalTime
OpenThread
OpenWaitableTimerW
MoveFileA
SetConsoleDisplayMode
SetFileApisToANSI
SetCommMask
GetTapeParameters
WaitForMultipleObjects
SetSystemTime
SetEnvironmentVariableA
GlobalWire
GetOEMCP
GetModuleHandleA
RequestWakeupLatency
GetConsoleCursorInfo
OpenSemaphoreW
GetVersionExA
lstrcpyA
WideCharToMultiByte
GetStartupInfoW
HeapValidate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
GetACP
GetCPInfo
IsValidCodePage
TlsGetValue
GetModuleHandleW
TlsAlloc
GetCurrentThreadId
TlsFree
LeaveCriticalSection
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
DebugBreak
OutputDebugStringA
OutputDebugStringW
RtlUnwind
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
InitializeCriticalSectionAndSpinCount
LoadLibraryA
FlushFileBuffers
ReadFile
SetStdHandle
WriteConsoleA
CloseHandle
CreateFileA
user32
GetWindowInfo
Sections
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 193B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ