C:\wxpqw\udydgq\jvpx\7817c7225f414072962fb8b86b2bceb7\ewuezd\xsrrfsxy\Release\xsrrfsxy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32N.exe
Resource
win10v2004-20240802-en
General
-
Target
1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32N
-
Size
450KB
-
MD5
638bde27e9224ccd829429fd6d13a8b0
-
SHA1
4bf857d7bedf137c7bfafb55048732072849ad0c
-
SHA256
1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32
-
SHA512
791a88ebce82033ea16ab8e94362e4422e5e6a62b55f1d694b2b11aa214979415d9cc50414c45b4cf1af541de854fb73e4a368b8766743d68b9a37c8ecbb4a96
-
SSDEEP
6144:EdzkwTata6GOw94Jl/e5I7wjmzCcOeHt6OiwAHT+pATwyElL5DbyGowb1U3V8r61:WPT0m4G5I7wjmn6yHp8wVLBy3US18xSL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32N
Files
-
1b989b474a14be062011075eb12b69211b11cba8ede5bc359b50a84ed5464d32N.exe windows:6 windows x86 arch:x86
e9aef503b3e4a8eb831af674be5da9e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CloseHandle
CompareStringW
CopyFileW
CreateDirectoryW
CreateFileW
CreateHardLinkW
CreateProcessW
CreateSymbolicLinkW
DecodePointer
DeleteCriticalSection
DeleteFileW
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FillConsoleOutputAttribute
FillConsoleOutputCharacterW
FindClose
FindFirstFileExW
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageW
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetDiskFreeSpaceExW
GetEnvironmentStringsW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileType
GetFullPathNameW
GetLastError
GetLocalTime
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetShortPathNameW
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetTimeFormatW
GetVolumeInformationW
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LocalAlloc
LocalFree
MoveFileExW
MoveFileW
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
RemoveDirectoryW
RtlUnwind
SearchPathW
SetConsoleCursorPosition
SetConsoleMode
SetConsoleTextAttribute
SetConsoleTitleW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetFileAttributesW
SetFilePointer
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SetVolumeLabelW
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
user32
CharNextExA
CharUpperBuffW
GetDC
GrayStringA
IsCharAlphaNumericW
IsCharAlphaW
LoadStringW
MessageBoxA
wsprintfW
shell32
FindExecutableW
SHFileOperationW
SHGetFileInfoW
advapi32
GetFileSecurityW
GetSecurityDescriptorOwner
LookupAccountSidW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.voltbl Size: 512B - Virtual size: 97B
.rsrc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ