C:\boce\ruramugiho13\bocup\vaxowu\sukan.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d65a485e8df155d8e1a48e7b1842b13e8b39be63.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d65a485e8df155d8e1a48e7b1842b13e8b39be63.exe
Resource
win10v2004-20241007-en
General
-
Target
d65a485e8df155d8e1a48e7b1842b13e8b39be63
-
Size
231KB
-
MD5
45f500dfc27107e7458ca8ab1b126ddd
-
SHA1
d65a485e8df155d8e1a48e7b1842b13e8b39be63
-
SHA256
8a517dbbe4d1e4f5bc7f96e862589faf84d0ebb334cce650aa79d8d879b2e15f
-
SHA512
a1a2afaa85bbaf662c427b4c6fea60655b37c57847310269974a0faa9a5ef0d3f60f8b137701334c50c1a71e989dab84b9a3cc523865b6e4a862e2c098f1a110
-
SSDEEP
6144:jBgZIc8u/RgZI6GmmiWCyjuVy/gHq7DZrwVfEz:FgZIB0StrWZrn1f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d65a485e8df155d8e1a48e7b1842b13e8b39be63
Files
-
d65a485e8df155d8e1a48e7b1842b13e8b39be63.exe windows:5 windows x86 arch:x86
a0b2f956e91fde175b8f92794fc8dd2f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameA
FoldStringA
InterlockedIncrement
_hread
CancelWaitableTimer
WaitNamedPipeW
BuildCommDCBW
GetConsoleAliasExesLengthW
PeekConsoleInputA
CreateFileA
RegisterWaitForSingleObject
LoadLibraryA
EnumResourceTypesA
TransmitCommChar
GetFirmwareEnvironmentVariableW
GetModuleFileNameW
BeginUpdateResourceA
GetConsoleAliasExesLengthA
WriteConsoleA
LoadLibraryW
WriteConsoleW
DeleteFileW
FillConsoleOutputCharacterW
GetProcAddress
GetSystemDefaultLCID
GetConsoleAliasW
FindFirstChangeNotificationA
RemoveDirectoryW
lstrcpynW
FindFirstFileExA
AreFileApisANSI
GetCurrentDirectoryW
GetConsoleAliasesLengthW
SetConsoleTitleA
GetBinaryTypeW
GlobalAlloc
FindNextFileA
OpenJobObjectW
HeapFree
_lopen
GetComputerNameW
SetThreadLocale
TlsGetValue
SetCalendarInfoW
SetComputerNameA
FoldStringW
GetDiskFreeSpaceW
RtlUnwind
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
GetLastError
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
HeapAlloc
TlsAlloc
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RaiseException
LCMapStringW
GetStringTypeW
SetStdHandle
FlushFileBuffers
HeapReAlloc
SetEndOfFile
GetProcessHeap
ReadFile
HeapSize
CreateFileW
user32
ClientToScreen
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 450KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ