C:\xefisay.pdb
Static task
static1
Behavioral task
behavioral1
Sample
02b137b6b241a10dcb0b2fdbe5c1f090N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
02b137b6b241a10dcb0b2fdbe5c1f090N.exe
Resource
win10v2004-20240802-en
General
-
Target
02b137b6b241a10dcb0b2fdbe5c1f090N.exe
-
Size
887KB
-
MD5
02b137b6b241a10dcb0b2fdbe5c1f090
-
SHA1
9a3642a88fbfb5dad28002fc59be862e67563acc
-
SHA256
82f0e9dfd4877c39903738a842045001359c431b114ca5cfa4e488a5c0257e06
-
SHA512
db143182e4df7bcc266f437191122f97aaeb451258dd0f8f17f3b9c51312098872faedeb8b1ae7c19f890ce54da71fc78e4225b77bd06d49965bcfcf5267408c
-
SSDEEP
12288:1G8ua3cRXmsmcU90p2aFZWI3ltIuEnnPJPYCGE1E2SIvhxfu0QnBYF7sFDF9R/:SaMkLBNanWKGuMRYDEO2SITQnBYZ+/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 02b137b6b241a10dcb0b2fdbe5c1f090N.exe
Files
-
02b137b6b241a10dcb0b2fdbe5c1f090N.exe.exe windows:5 windows x86 arch:x86
49f7d03a7898b500bdee4de1729ec84d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
GetVolumeNameForVolumeMountPointA
GetCommandLineW
SetVolumeLabelA
GetFileSize
CreateMutexW
WriteConsoleInputW
WritePrivateProfileStructA
GetConsoleAliasesLengthW
GetProfileIntW
GetDefaultCommConfigW
LoadResource
SetConsoleTextAttribute
InterlockedDecrement
ZombifyActCtx
GetNamedPipeHandleStateA
GetProfileSectionA
GetComputerNameW
GetCommProperties
FreeEnvironmentStringsA
GetProcessPriorityBoost
GetPrivateProfileStringW
GetWindowsDirectoryA
WriteFile
FindActCtxSectionStringA
SetCommState
CreateDirectoryExW
TlsSetValue
FindResourceExA
GlobalAlloc
GetConsoleMode
SizeofResource
GetCalendarInfoA
ReadFileScatter
GetSystemWow64DirectoryW
SetSystemTimeAdjustment
GetSystemWindowsDirectoryA
GlobalFlags
SetConsoleCursorPosition
GetBinaryTypeA
GetAtomNameW
IsDBCSLeadByte
GetOverlappedResult
CompareStringW
lstrlenW
SetConsoleTitleA
GlobalUnlock
GetConsoleOutputCP
CreateDirectoryA
SetCurrentDirectoryA
SetThreadLocale
WriteProfileSectionA
FreeUserPhysicalPages
SetComputerNameA
SearchPathA
GetLocalTime
LoadLibraryA
IsSystemResumeAutomatic
SetConsoleOutputCP
SetConsoleWindowInfo
FindAtomA
GetTapeParameters
WTSGetActiveConsoleSessionId
SetConsoleCursorInfo
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
CompareStringA
GetConsoleCursorInfo
ScrollConsoleScreenBufferA
WriteFileEx
FileTimeToLocalFileTime
InterlockedPushEntrySList
LCMapStringW
CopyFileExA
DeleteFileA
CreateFileA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlUnwind
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
GetProcAddress
TlsGetValue
GetModuleHandleW
TlsAlloc
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
GetConsoleCP
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
InitializeCriticalSectionAndSpinCount
LCMapStringA
SetStdHandle
WriteConsoleA
SetFilePointer
CloseHandle
user32
GetMessageTime
GetMenuCheckMarkDimensions
Exports
Exports
_CallPattern@8
Sections
.text Size: 740KB - Virtual size: 739KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ