C:\day\xufacatojayog\lel\pezuvofu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
05c9543368ca897f44fb7c275d775cb9c7d9965c2fe640dc90a885c704fb8d49.exe
Resource
win7-20240903-en
General
-
Target
05c9543368ca897f44fb7c275d775cb9c7d9965c2fe640dc90a885c704fb8d49
-
Size
359KB
-
MD5
f2fae1652133c325b3e311ae2fdff3ae
-
SHA1
e7cb4f0d57f60977e5a6d9549d830bb527524886
-
SHA256
05c9543368ca897f44fb7c275d775cb9c7d9965c2fe640dc90a885c704fb8d49
-
SHA512
fdbb7d37167f31792a71f0d83b78cf216fc1152bb17b6fd8613b6e32243e0291fa67ac0217a2d7010a835514d3c9e4533a8b86f5d47405caea95fce17e611c86
-
SSDEEP
6144:braE7H2Ii1/MB7SaygVSJC+d8UYwozJ9oJJp86kucCmCD:braE7HJi1/mSlJCsYwqJB6k3CHD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05c9543368ca897f44fb7c275d775cb9c7d9965c2fe640dc90a885c704fb8d49
Files
-
05c9543368ca897f44fb7c275d775cb9c7d9965c2fe640dc90a885c704fb8d49.exe windows:5 windows x86 arch:x86
2def91c0581afe8a9028a470a8151c40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindResourceExW
InterlockedIncrement
GetCommState
InterlockedDecrement
UnlockFile
SetEvent
FreeEnvironmentStringsA
CreateNamedPipeW
GetConsoleAliasesLengthA
GetCommandLineA
GetPrivateProfileIntA
LoadLibraryW
GetConsoleAliasExesLengthW
HeapDestroy
CreateSemaphoreA
GetBinaryTypeA
TerminateProcess
GetSystemDirectoryA
lstrlenW
LCMapStringA
GetPrivateProfileIntW
InterlockedExchange
GetStartupInfoA
GetStdHandle
GetCPInfoExW
FreeLibraryAndExitThread
OpenMutexW
GetLastError
SetLocalTime
GetThreadLocale
GetProcAddress
EnterCriticalSection
LoadLibraryA
LocalAlloc
WritePrivateProfileStringA
GetNumberFormatW
GetProfileStringA
SetThreadIdealProcessor
HeapWalk
FindAtomA
SetSystemTime
GlobalWire
GetModuleFileNameA
CreateIoCompletionPort
GetModuleHandleA
FindFirstChangeNotificationA
FindNextFileW
WriteProfileStringW
SetFileShortNameA
TlsAlloc
EnumResourceLanguagesW
UnregisterWaitEx
CopyFileExA
DeleteFileA
GetVolumeInformationW
LocalFileTimeToFileTime
GetCurrentDirectoryW
GetThreadContext
EncodePointer
DecodePointer
HeapSetInformation
GetStartupInfoW
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetModuleHandleW
ExitProcess
HeapValidate
IsBadReadPtr
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
RtlUnwind
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
MultiByteToWideChar
IsProcessorFeaturePresent
FlushFileBuffers
SetStdHandle
LCMapStringW
GetStringTypeW
CloseHandle
CreateFileW
RaiseException
advapi32
AbortSystemShutdownA
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ