C:\fumecabopor\guzegecokusazu\nec-jimahe\32\va.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ee5d0b9bf480ec024cdb532bcfe285b9ab2ef0b3cff9318d13305c8a847abd10.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee5d0b9bf480ec024cdb532bcfe285b9ab2ef0b3cff9318d13305c8a847abd10.exe
Resource
win10v2004-20240802-en
General
-
Target
ee5d0b9bf480ec024cdb532bcfe285b9ab2ef0b3cff9318d13305c8a847abd10
-
Size
4.4MB
-
MD5
80c32518fe9ee262970d1f09adda666b
-
SHA1
4eae68701ea246d1e4986004b8db3e235c757b07
-
SHA256
ee5d0b9bf480ec024cdb532bcfe285b9ab2ef0b3cff9318d13305c8a847abd10
-
SHA512
f1d946e76c1bf72fba84865bdaa946809ca86e2588d8cacc27a82b9b0b54d3dda59b4d8fb68416a0d1f5273f9b4e5e1228b3bda50fc30a667ff1d6bfd9e0effc
-
SSDEEP
98304:PMcjnDJ3MoZVx2dL6zNnVMxf0eUVzkBakgT9uhFBFl4Npi+y:PMYnDBMoOdOJnVMxTUVwBaPTG9lo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ee5d0b9bf480ec024cdb532bcfe285b9ab2ef0b3cff9318d13305c8a847abd10
Files
-
ee5d0b9bf480ec024cdb532bcfe285b9ab2ef0b3cff9318d13305c8a847abd10.exe windows:5 windows x86 arch:x86
dbbfd4149087490a92e718a2b81d99d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalFix
HeapReAlloc
lstrlenA
SetEndOfFile
InterlockedIncrement
SetEnvironmentVariableW
GetModuleHandleExW
CreateDirectoryW
SetHandleInformation
GetProfileSectionA
SetVolumeMountPointW
OpenSemaphoreA
FreeEnvironmentStringsA
GetModuleHandleW
EnumTimeFormatsW
CreateActCtxW
GetDriveTypeA
TlsSetValue
GetVolumeInformationA
ReadConsoleInputA
GetPrivateProfileStructW
GetComputerNameExA
WritePrivateProfileStructW
SetConsoleMode
VerifyVersionInfoA
WriteConsoleW
GetBinaryTypeA
WritePrivateProfileSectionW
TerminateProcess
GetAtomNameW
IsDBCSLeadByte
ReadFile
CreateFileW
GetOverlappedResult
CompareStringW
GetACP
SetCurrentDirectoryA
FillConsoleOutputCharacterA
OpenMutexW
GetHandleInformation
GetLastError
GetCurrentDirectoryW
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
IsValidCodePage
CopyFileA
SetComputerNameA
BuildCommDCBW
ResetEvent
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
OpenWaitableTimerW
LocalAlloc
GetFileType
AddAtomW
WriteProfileSectionW
GetCommMask
SetSystemTime
GetModuleFileNameA
SetConsoleCursorInfo
SetConsoleTitleW
RequestWakeupLatency
GetCPInfoExA
SetCalendarInfoA
GetVersionExA
ReadConsoleInputW
LocalSize
LCMapStringW
CopyFileExA
CloseHandle
SetStdHandle
GetConsoleMode
FindFirstFileA
GetTempFileNameW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
InterlockedDecrement
DecodePointer
ExitProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetModuleFileNameW
WriteFile
GetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapValidate
IsBadReadPtr
TlsAlloc
TlsGetValue
TlsFree
SetLastError
HeapCreate
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
RtlUnwind
HeapAlloc
HeapSize
HeapQueryInformation
HeapFree
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
OutputDebugStringA
OutputDebugStringW
IsProcessorFeaturePresent
RaiseException
SetFilePointer
GetConsoleCP
FlushFileBuffers
user32
GetMessageTime
GetMenuCheckMarkDimensions
advapi32
AdjustTokenPrivileges
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 4.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ