C:\bufado70_joviz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e14e3ba37274e5efe932d789e8e24e20c7c21ad852978df80bb9392f5acf238e.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e14e3ba37274e5efe932d789e8e24e20c7c21ad852978df80bb9392f5acf238e.exe
Resource
win10v2004-20240802-en
General
-
Target
e14e3ba37274e5efe932d789e8e24e20c7c21ad852978df80bb9392f5acf238e
-
Size
548KB
-
MD5
c5af0e9033ad152595f2c8988591d02d
-
SHA1
67f1f51f7127f394a40603e9d862f3b3d5f64427
-
SHA256
e14e3ba37274e5efe932d789e8e24e20c7c21ad852978df80bb9392f5acf238e
-
SHA512
6f545f7c92a445b931f6ff6eb4773733c3520aaf625b25f165801b00e17833dbe445fc263f283e4833eb3c18949f760d7c8a521f5d46a933f409aa7dd93dc6fc
-
SSDEEP
12288:IyYFmZpQLI0rais2DlDKr5XPX6oG+46UjpVER:IyW9sKPsrBX6r+4LY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e14e3ba37274e5efe932d789e8e24e20c7c21ad852978df80bb9392f5acf238e
Files
-
e14e3ba37274e5efe932d789e8e24e20c7c21ad852978df80bb9392f5acf238e.exe windows:5 windows x86 arch:x86
ceacc43c0db658592494aa369ad9da97
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MapViewOfFile
FreeEnvironmentStringsA
GetConsoleAliasesLengthA
ReadConsoleW
CreateDirectoryExW
GetSystemDirectoryW
LoadLibraryW
InitializeCriticalSectionAndSpinCount
CreateEventA
LeaveCriticalSection
GetBinaryTypeA
LocalHandle
CompareStringW
lstrlenW
ReplaceFileA
SetFilePointer
SetLastError
BindIoCompletionCallback
AttachConsole
VirtualAlloc
SetStdHandle
WriteConsoleA
LocalAlloc
WriteProfileSectionW
SetConsoleWindowInfo
GetModuleHandleA
GetConsoleTitleW
VirtualProtect
GetCPInfoExA
SetCalendarInfoA
CloseHandle
FreeLibraryAndExitThread
FindFirstChangeNotificationW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapReAlloc
HeapAlloc
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
EnterCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
LoadLibraryA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
GetLocaleInfoA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CreateFileA
user32
ClientToScreen
Sections
.text Size: 499KB - Virtual size: 498KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ