C:\puk\caka.pdb
Static task
static1
Behavioral task
behavioral1
Sample
253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744.exe
Resource
win10v2004-20240802-en
General
-
Target
253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744
-
Size
513KB
-
MD5
4c7e4c18ff36db58ae07ad4e9a440254
-
SHA1
f4a70b79052a40f5ec5e5462ede254ec9bd65faa
-
SHA256
253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744
-
SHA512
b3cb9dad23ada259f7bd7c161011d35e7912d54ff5b82790d44c12f29b899d460e0c4b1300dd94b9c136d52d29d9d781d64cf9b9d41403b551a8120c9ba79bad
-
SSDEEP
12288:bxnAbkAw5bO0vdJxxYh/AIOQKsIb/mRyazLhm2ld:bxAbkJNOqfxYx2AICRyCLz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744
Files
-
253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744.exe windows:5 windows x86 arch:x86
010b99662693ba25ba201961c31754d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLongPathNameA
GetUserDefaultLangID
AddRefActCtx
GetCPInfoExW
WriteConsoleInputA
ReadConsoleInputW
GetConsoleAliasW
SetCommTimeouts
SetConsoleCP
VerifyVersionInfoA
WaitNamedPipeA
CreateMutexA
WriteConsoleW
GetLastError
CreateFileA
WritePrivateProfileSectionW
GetPrivateProfileSectionA
EnumDateFormatsExA
SetStdHandle
LoadLibraryA
RequestDeviceWakeup
FindFirstVolumeA
ReadFile
BuildCommDCBA
VerLanguageNameW
SetFileApisToANSI
WriteProcessMemory
RequestWakeupLatency
ResetEvent
Sleep
EndUpdateResourceW
GetCPInfo
SetConsoleCtrlHandler
SetConsoleTitleA
GenerateConsoleCtrlEvent
EraseTape
SetConsoleTextAttribute
AttachConsole
GetConsoleAliasesLengthW
ZombifyActCtx
ReadConsoleOutputW
GetSystemWindowsDirectoryA
GetStringTypeW
BuildCommDCBAndTimeoutsA
HeapAlloc
HeapLock
GetAtomNameW
HeapReAlloc
HeapValidate
GetGeoInfoA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CreateThread
GetVersionExA
GetACP
WaitForMultipleObjects
WaitForSingleObject
GetSystemPowerStatus
WriteConsoleOutputCharacterA
LocalAlloc
GetMailslotInfo
SetEnvironmentVariableW
GetFileAttributesExA
GetComputerNameW
CommConfigDialogA
GetConsoleWindow
PostQueuedCompletionStatus
GetDiskFreeSpaceW
LeaveCriticalSection
EnumDateFormatsA
GetCurrentConsoleFont
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetFilePointer
TerminateProcess
IsDebuggerPresent
SetHandleCount
GetFileType
GetStartupInfoA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
MultiByteToWideChar
GetStringTypeA
LCMapStringA
LCMapStringW
CloseHandle
user32
GetAltTabInfoW
gdi32
GetCharWidth32A
advapi32
AdjustTokenPrivileges
BackupEventLogA
Exports
Exports
@GetSecondVice@0
Sections
.text Size: 363KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 39.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ