C:\yekaxo\sugof\labefumosiy lawukiro wafoseyud\xexo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
05b89843f4c83faf75e680bcddfe555d62c31ccf9588d6391f50e86adf380340.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05b89843f4c83faf75e680bcddfe555d62c31ccf9588d6391f50e86adf380340.exe
Resource
win10v2004-20241007-en
General
-
Target
9ecb233859439e55b71a3a1ff2043dff4d344917cd9fa895aee422c9251baff0
-
Size
260KB
-
MD5
b5d7d1b465b2a94fd0ef75c114e42b5f
-
SHA1
a83e361dd13e1a8f6b8ead47347ebf4ac7d0bd45
-
SHA256
9ecb233859439e55b71a3a1ff2043dff4d344917cd9fa895aee422c9251baff0
-
SHA512
f397391bf20ee8402578dc7aaf9bf6e5435244f93f78f8cd4346ade0c5dbf4cd4d24a61728e69ab5208e3a49958f897159267ce9f84d89765de6f428b12d0279
-
SSDEEP
6144:kpJOabteDht0lbftY7d+hTgr+PdZWiXaE0sgIqAlKW86rQV2c:kpzbU92fhg+ZxacgI7O6QV2c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/05b89843f4c83faf75e680bcddfe555d62c31ccf9588d6391f50e86adf380340
Files
-
9ecb233859439e55b71a3a1ff2043dff4d344917cd9fa895aee422c9251baff0.zip
-
05b89843f4c83faf75e680bcddfe555d62c31ccf9588d6391f50e86adf380340.exe windows:5 windows x86 arch:x86
112f301b72f7079fdf51b59676b2b142
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
OpenMutexW
SetLocaleInfoA
FindNextVolumeA
GetNamedPipeHandleStateA
FileTimeToLocalFileTime
EnumResourceTypesW
EnumResourceNamesA
FillConsoleOutputCharacterA
DeleteTimerQueueTimer
TerminateProcess
SetLastError
SetEvent
FindNextFileW
CopyFileExA
BuildCommDCBA
FreeResource
GetVersionExA
ReadConsoleOutputCharacterW
SetDefaultCommConfigW
VerLanguageNameW
GetCommConfig
WritePrivateProfileStructA
LocalFree
FindNextVolumeMountPointA
GetWriteWatch
WriteConsoleInputW
LoadResource
AddAtomW
GlobalDeleteAtom
GetThreadPriority
CallNamedPipeA
GetDriveTypeW
BuildCommDCBAndTimeoutsW
GetProcAddress
GlobalAlloc
GetVersionExW
GlobalFix
FindFirstChangeNotificationW
VerifyVersionInfoA
FormatMessageA
SetDllDirectoryA
GetModuleHandleW
WritePrivateProfileStringW
GetUserDefaultLCID
TerminateThread
SetDllDirectoryW
SetConsoleWindowInfo
InterlockedDecrement
GetStartupInfoA
CopyFileA
SetCalendarInfoW
DebugBreak
SetConsoleCursorInfo
GetSystemWow64DirectoryW
FreeLibraryAndExitThread
GetModuleFileNameA
WaitForDebugEvent
InterlockedExchangeAdd
GetOEMCP
GetPrivateProfileStringA
CreateActCtxA
ReadConsoleInputW
OutputDebugStringW
PulseEvent
SetThreadAffinityMask
FlushConsoleInputBuffer
lstrlenA
LoadLibraryW
WriteConsoleW
GetThreadContext
FreeEnvironmentStringsA
TryEnterCriticalSection
QueryDepthSList
DeleteFiber
SetProcessPriorityBoost
UnlockFile
FreeEnvironmentStringsW
GetConsoleCP
CreateIoCompletionPort
FreeConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthW
CreateMailslotW
GetCommState
MoveFileWithProgressA
GetPrivateProfileIntA
GetSystemTimeAdjustment
EnumSystemLocalesW
OpenMutexA
GetLastError
WriteProfileStringW
OpenWaitableTimerW
GetConsoleAliasesLengthW
PeekNamedPipe
FillConsoleOutputCharacterW
BuildCommDCBAndTimeoutsA
GetConsoleAliasExesA
Sleep
InterlockedIncrement
ExitProcess
MoveFileA
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
WriteFile
GetStdHandle
GetACP
GetCPInfo
IsValidCodePage
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
OutputDebugStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
user32
CharUpperW
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 181KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ