C:\cujame53\daxexu\totawo9_xizokejoji dadesobo_j.pdb
Static task
static1
Behavioral task
behavioral1
Sample
369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94-dropped.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94-dropped.exe
Resource
win10v2004-20240802-en
General
-
Target
369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94-dropped.bin
-
Size
11.8MB
-
MD5
af9f5adf151afef5a8c8378e1ea0799d
-
SHA1
69ec980d31caf71bdc12cdc1f30bcb92c110a523
-
SHA256
369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94
-
SHA512
c80c35c561a64e82bd7388e1d64e95cf8bdc282869a5daa1d051dbdae613c982be341236114a6efd2769f0f3ef98aaeeba1b3bc489a2222fc72d3d282270d533
-
SSDEEP
12288:ptfqkWH3ZIQqcggggggggggggggggggggggggggggggggggggggggggggggggggw:pY1HpLq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94-dropped.bin
Files
-
369daa4e1bc4ec94f390bfaa316ebfa85ba5538c4e869030e63957c827fbcb94-dropped.bin.exe windows:5 windows x86 arch:x86
64844bd5bbea5ab39e782122c19db725
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameA
WriteConsoleInputW
ReadConsoleInputA
GetSystemDirectoryA
WriteConsoleW
WaitNamedPipeA
BuildCommDCBA
InterlockedDecrement
BeginUpdateResourceA
CancelTimerQueueTimer
GetCPInfoExW
GetConsoleAliasExesLengthW
EnumTimeFormatsA
CopyFileA
ReadConsoleOutputCharacterW
GetConsoleAliasesLengthA
GlobalAlloc
GetProcAddress
GetUserDefaultLCID
CancelWaitableTimer
UnhandledExceptionFilter
SizeofResource
EndUpdateResourceA
GetPrivateProfileIntW
EnumResourceNamesA
GlobalReAlloc
SetFileAttributesW
AreFileApisANSI
GetCurrentDirectoryW
GetAtomNameA
GetFileAttributesA
SetConsoleTitleW
VerSetConditionMask
SetProcessWorkingSetSize
GetLongPathNameW
GetLastError
GetSystemDefaultLangID
GetConsoleProcessList
PurgeComm
BuildCommDCBAndTimeoutsA
OpenJobObjectA
InitializeCriticalSectionAndSpinCount
FindResourceExA
EnumCalendarInfoExW
GetConsoleMode
GetDiskFreeSpaceA
GetConsoleAliasExesW
GlobalMemoryStatusEx
ReadConsoleOutputAttribute
GetCPInfoExA
CreateFileW
LoadLibraryW
GetSystemWindowsDirectoryA
HeapReAlloc
HeapFree
HeapAlloc
EncodePointer
DecodePointer
RtlUnwind
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
HeapCreate
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
Sleep
HeapSize
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WideCharToMultiByte
GetConsoleCP
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
SetStdHandle
LCMapStringW
MultiByteToWideChar
GetStringTypeW
FlushFileBuffers
CloseHandle
user32
ClientToScreen
advapi32
AreAnyAccessesGranted
winhttp
WinHttpCloseHandle
Sections
.text Size: 189KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 40.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nizike Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11.6MB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ