C:\terir\kovodani\bibanomovadu29\nuzolihope.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cbba8d8f2addd8e8c8fdb6d0e84daa90N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cbba8d8f2addd8e8c8fdb6d0e84daa90N.exe
Resource
win10v2004-20240802-en
General
-
Target
cbba8d8f2addd8e8c8fdb6d0e84daa90N.exe
-
Size
534KB
-
MD5
cbba8d8f2addd8e8c8fdb6d0e84daa90
-
SHA1
6cdb4fb697d776251f22c6f7d9404d7b1a6ed733
-
SHA256
ff0f17b2d53553f4043579fd6a7c41765bd8e6fc0bd6e90b869582e7df2233a5
-
SHA512
f182c7c66f8271f877c2a44f5bb007e6adf5e18876b13487b148b6ac776c18d18afd6b1a3f91f9e2467dbf8dc565a7cff273f0e9ee27ac493348956e9b43afcc
-
SSDEEP
12288:OCbqLsbMPaVICFnxOY0To5NpNaN28yap0OEZEEl187dpN:vWoNGCFA4PNWpJMEp5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource cbba8d8f2addd8e8c8fdb6d0e84daa90N.exe
Files
-
cbba8d8f2addd8e8c8fdb6d0e84daa90N.exe.exe windows:5 windows x86 arch:x86
724fc268cccef646d4517481c9e2932b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalFix
HeapReAlloc
lstrlenA
GetModuleHandleExA
SetEndOfFile
InterlockedIncrement
CreateDirectoryW
GetProfileSectionA
SetVolumeMountPointW
OpenSemaphoreA
FreeEnvironmentStringsA
GetModuleHandleW
EnumTimeFormatsW
CreateActCtxW
CreateDirectoryExW
GetDriveTypeA
TlsSetValue
GetVolumeInformationA
LoadLibraryW
ReadConsoleInputA
GetPrivateProfileStructW
GetComputerNameExA
WritePrivateProfileStructW
SetConsoleMode
VerifyVersionInfoA
WriteConsoleW
GetBinaryTypeA
WritePrivateProfileSectionW
TerminateProcess
GetAtomNameW
IsDBCSLeadByte
ReadFile
CreateFileW
GetOverlappedResult
CompareStringW
GetACP
FillConsoleOutputCharacterA
FindFirstFileA
OpenMutexW
GetHandleInformation
GetLastError
GetCurrentDirectoryW
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
IsValidCodePage
CopyFileA
SetComputerNameA
BuildCommDCBW
ResetEvent
UnhandledExceptionFilter
OpenWaitableTimerW
LocalAlloc
GetFileType
AddAtomW
WriteProfileSectionW
GetCommMask
SetSystemTime
SetEnvironmentVariableA
GetModuleFileNameA
SetConsoleCursorInfo
SetConsoleTitleW
RequestWakeupLatency
GetCPInfoExA
SetCalendarInfoA
GetVersionExA
ReadConsoleInputW
LocalSize
LCMapStringW
CopyFileExA
CloseHandle
SetStdHandle
GetConsoleMode
SetCurrentDirectoryA
GetTempFileNameW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
InterlockedDecrement
DecodePointer
ExitProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetModuleFileNameW
WriteFile
GetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapValidate
IsBadReadPtr
TlsAlloc
TlsGetValue
TlsFree
SetLastError
HeapCreate
GetOEMCP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
HeapAlloc
HeapSize
HeapQueryInformation
HeapFree
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
OutputDebugStringA
OutputDebugStringW
IsProcessorFeaturePresent
RaiseException
SetFilePointer
GetConsoleCP
FlushFileBuffers
user32
GetComboBoxInfo
GetMenuCheckMarkDimensions
advapi32
AdjustTokenPrivileges
Sections
.text Size: 443KB - Virtual size: 442KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ