C:\jewap.pdb
Static task
static1
Behavioral task
behavioral1
Sample
162364f0a7edb5cc5cb742419bc0114f3449330432f03c8f89b414d0c236bf5e.exe
Resource
win7-20240708-en
General
-
Target
162364f0a7edb5cc5cb742419bc0114f3449330432f03c8f89b414d0c236bf5e
-
Size
313KB
-
MD5
4656bee6079201bb6b4a347969ad7925
-
SHA1
d1c662e8a3399321f7310f902b9e1c8c1ea37607
-
SHA256
162364f0a7edb5cc5cb742419bc0114f3449330432f03c8f89b414d0c236bf5e
-
SHA512
3c1d55b2ea01aae0ae7704784dda03b4f8221f8d49c5e668aa69808c3b3c92fba72280cecc31adec015b20e9d64ef9ced048ce35dfc0c0111bb1c0b33fa7a64b
-
SSDEEP
6144:nmZQcMzBIQzJbJymU30IdTz2zkCKkcL3IZC+uIZrBQCj7aCE6c:mZm9zJbJygIdOzgkcrIk41sMc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 162364f0a7edb5cc5cb742419bc0114f3449330432f03c8f89b414d0c236bf5e
Files
-
162364f0a7edb5cc5cb742419bc0114f3449330432f03c8f89b414d0c236bf5e.exe windows:5 windows x86 arch:x86
42558e76cb0191e50d5255e5f863e8b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
GetThreadContext
UnregisterWait
DosDateTimeToFileTime
FindFirstChangeNotificationW
CopyFileExW
CallNamedPipeA
HeapAlloc
SetWaitableTimer
InterlockedIncrement
InterlockedDecrement
GetProfileStringW
FreeEnvironmentStringsA
CreateNamedPipeW
LocalFlags
SetCommState
SetProcessPriorityBoost
GetSystemTimes
ActivateActCtx
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
GetVolumeInformationA
LoadLibraryW
TerminateThread
LeaveCriticalSection
VerifyVersionInfoA
FileTimeToSystemTime
IsDBCSLeadByte
GetCompressedFileSizeA
lstrlenW
LCMapStringA
InterlockedExchange
GetStartupInfoA
SetThreadLocale
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
SetStdHandle
DisableThreadLibraryCalls
LoadLibraryA
WritePrivateProfileStringA
FindAtomA
GetModuleFileNameA
GetThreadPriority
CreateIoCompletionPort
GetModuleHandleA
HeapSetInformation
FindNextFileW
WriteProfileStringW
GetCurrentThreadId
TlsAlloc
LocalSize
EnumResourceLanguagesW
SetFileValidData
GetSystemTime
GetProfileSectionW
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
EnterCriticalSection
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetModuleHandleW
Sleep
ExitProcess
TlsGetValue
TlsSetValue
TlsFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetFilePointer
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
DebugBreak
OutputDebugStringA
OutputDebugStringW
LCMapStringW
CreateFileA
CloseHandle
FlushFileBuffers
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 198KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ