C:\buvivujev\vofevaxu\zad zizuyaziyiba2.pdb
Static task
static1
Behavioral task
behavioral1
Sample
53e05dcabe00916f6ef2420a03b8350a71f01391cba91415cbbf5b55660d9f30.exe
Resource
win7-20240903-en
General
-
Target
53e05dcabe00916f6ef2420a03b8350a71f01391cba91415cbbf5b55660d9f30
-
Size
395KB
-
MD5
caa5aca0c36e48ed6901c676e332c26a
-
SHA1
efe60a5048070a9eb13bb90a5a3bbd379e455664
-
SHA256
53e05dcabe00916f6ef2420a03b8350a71f01391cba91415cbbf5b55660d9f30
-
SHA512
cf3ca8322a62747ea59acd34d454e3a62b4016dd0a8ba1708c146692e34cfca96160405c2e900af3534149550c40fef09624f3e6c5924b4caf944169e59d62d2
-
SSDEEP
6144:JPPjijEba6j3YpoG2Q9f3kqutSGTWg4VsHdl7HFIIn4QFFW5nfgR4CF0u:NjAEO6jSoGF9f67TW9VUVJnXFIgj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 53e05dcabe00916f6ef2420a03b8350a71f01391cba91415cbbf5b55660d9f30
Files
-
53e05dcabe00916f6ef2420a03b8350a71f01391cba91415cbbf5b55660d9f30.exe windows:5 windows x86 arch:x86
f3d1e6cf3432652961f54efc8bca474f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
FileTimeToDosDateTime
EnumResourceNamesW
GetNativeSystemInfo
CopyFileExW
SetLocalTime
GetCPInfo
HeapAlloc
SetDllDirectoryW
InterlockedIncrement
GetCommState
ReadConsoleA
InterlockedDecrement
GlobalSize
GetSystemWindowsDirectoryW
GlobalLock
GetProfileSectionA
GetModuleHandleW
GetTickCount
GetPrivateProfileStringW
TlsSetValue
ActivateActCtx
GlobalAlloc
LoadLibraryW
TerminateThread
GetConsoleAliasExesLengthW
GetCompressedFileSizeA
CompareStringW
lstrlenW
SetThreadPriority
DeactivateActCtx
GetNamedPipeHandleStateW
LCMapStringA
GetPrivateProfileIntW
VerifyVersionInfoW
CreateDirectoryA
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetLastError
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
SetStdHandle
EnterCriticalSection
CreateMemoryResourceNotification
DisableThreadLibraryCalls
Process32FirstW
WritePrivateProfileStringA
FindAtomA
SetSystemTime
SetEnvironmentVariableA
FindNextFileA
WriteProfileStringA
FindFirstChangeNotificationA
FreeEnvironmentStringsW
EnumResourceNamesA
GetStringTypeW
WriteProfileStringW
GetCurrentThreadId
GetCPInfoExA
UnregisterWaitEx
TlsFree
GetVolumeInformationW
FlushFileBuffers
CloseHandle
MultiByteToWideChar
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
DeleteCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
SetLastError
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
CreateFileA
user32
GetMenuItemID
winhttp
WinHttpWriteData
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 19.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ