C:\vinu\vajajiwuwap\38\vewuvikujiw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb.exe
Resource
win10v2004-20241007-en
General
-
Target
b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb
-
Size
12.1MB
-
MD5
ffa1b8f70c8986ed5d92cc065e09e9d0
-
SHA1
a3dc175cbaf7da499dd09298e303144fac0ec032
-
SHA256
b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb
-
SHA512
60dcb3bb2d9720b8012452c57bfb4633ae5e14892bc99306a5d70864fa72dbdceae8278aec6ebf1223baf5d2ff2664b1fe88a728f8254a71ab41cd2fde3d8e4d
-
SSDEEP
24576:iW6y/MK+Iw9zXIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII:Z7X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb
Files
-
b41909dc503614ac7de7748dc6cdbd38c09b0aaf13e0200162ddf06f30f17ceb.exe windows:5 windows x86 arch:x86
80720d283b0420bbcbb388cde3e0df65
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapLock
GetExitCodeProcess
DeactivateActCtx
GetVersionExW
GetConsoleCP
GetConsoleAliasesLengthA
GetDefaultCommConfigA
FindFirstFileExA
GetDriveTypeA
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointW
SetCurrentDirectoryW
GetLongPathNameW
CopyFileW
TlsGetValue
GetConsoleCursorInfo
SetComputerNameExW
SystemTimeToTzSpecificLocalTime
FindAtomA
ReleaseSemaphore
CallNamedPipeW
CreateMailslotW
BuildCommDCBAndTimeoutsA
VirtualProtect
LoadLibraryA
LocalAlloc
TryEnterCriticalSection
GetCommandLineW
InterlockedDecrement
GetCalendarInfoW
DeleteFileA
CreateActCtxW
OutputDebugStringA
SetSystemTimeAdjustment
SetPriorityClass
WritePrivateProfileStringW
GlobalUnWire
GetProcessHeap
GetStartupInfoW
GetDiskFreeSpaceExW
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryW
WriteProfileSectionA
GetProfileStringA
GetLastError
DeleteVolumeMountPointA
DebugBreak
GetPrivateProfileSectionW
lstrcmpA
ReadFileScatter
GetSystemWindowsDirectoryA
TerminateProcess
GlobalFindAtomW
FindCloseChangeNotification
GetTapeParameters
SetMailslotInfo
InterlockedExchange
DefineDosDeviceW
FindVolumeMountPointClose
EndUpdateResourceA
WriteConsoleA
GetSystemTimeAdjustment
GetPrivateProfileSectionA
WritePrivateProfileSectionA
GetPrivateProfileStructW
GetFileAttributesExW
Process32NextW
MoveFileA
GetVolumePathNameA
GetConsoleMode
HeapUnlock
lstrcmpW
SetDefaultCommConfigA
FindActCtxSectionGuid
SetThreadContext
MoveFileExW
GlobalUnlock
UnregisterWaitEx
BuildCommDCBA
PeekConsoleInputW
GetBinaryTypeW
OpenEventW
TransmitCommChar
WaitNamedPipeA
GetPrivateProfileSectionNamesW
FindResourceExW
EnumTimeFormatsW
GetLocalTime
SetLocalTime
OpenSemaphoreA
GetProcAddress
SetFileShortNameA
lstrcpyW
VerLanguageNameW
SetThreadExecutionState
SetSystemTime
LockFile
VerSetConditionMask
SetConsoleCP
GetConsoleAliasW
FlushConsoleInputBuffer
AllocConsole
GetAtomNameW
WriteConsoleInputA
TransactNamedPipe
EnumDateFormatsW
GetCommState
FileTimeToLocalFileTime
_lopen
GetWriteWatch
SetConsoleMode
GetModuleHandleA
WriteConsoleOutputCharacterA
GetConsoleAliasExesLengthA
HeapReAlloc
GetCommMask
SetFilePointer
CancelWaitableTimer
GetProcessHandleCount
GetConsoleAliasesLengthW
GetCurrentProcessId
SetNamedPipeHandleState
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringA
DeleteAtom
GlobalAddAtomW
AssignProcessToJobObject
QueryDosDeviceW
InitializeCriticalSection
Process32FirstW
GetBinaryTypeA
CreateIoCompletionPort
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
Sleep
InterlockedIncrement
ExitProcess
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
SetHandleCount
GetStdHandle
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
GetConsoleOutputCP
CloseHandle
CreateFileA
user32
OemToCharW
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 646KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ses Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pobogud Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11.8MB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ