C:\bovejitu-tosurobepami11\webef-nikak.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e2168ed68de63cdb549faa1697acf2220044c7c1695a93235caf4484929c7070.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2168ed68de63cdb549faa1697acf2220044c7c1695a93235caf4484929c7070.exe
Resource
win10v2004-20241007-en
General
-
Target
e2168ed68de63cdb549faa1697acf2220044c7c1695a93235caf4484929c7070
-
Size
326KB
-
MD5
24cf04b9574b3208c70cd32b43b6c632
-
SHA1
02352b8efa778d87b4cb08e6d36da6427261649c
-
SHA256
e2168ed68de63cdb549faa1697acf2220044c7c1695a93235caf4484929c7070
-
SHA512
e015f91a4be40e3ea72085b8657130c0734636fc558e5c7bbbd9c8e521fc02c4bb7294b0db0ee153a4c89399a00902ef19bfdc5a83514ee17c44c9dcf5b01c88
-
SSDEEP
6144:+uzciL9GgZAqo80LMCdA2eFNIhROeVkLVoXxpl4CF:/coPAm0LK2erIhk8xpH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2168ed68de63cdb549faa1697acf2220044c7c1695a93235caf4484929c7070
Files
-
e2168ed68de63cdb549faa1697acf2220044c7c1695a93235caf4484929c7070.exe windows:5 windows x86 arch:x86
b47655599e49bc4c256f24947d7700bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FileTimeToDosDateTime
GetNativeSystemInfo
CopyFileExW
TlsGetValue
GetStringTypeA
SetLocalTime
HeapAlloc
SetDllDirectoryW
InterlockedIncrement
GetCommState
ReadConsoleA
InterlockedDecrement
GlobalSize
GetSystemWindowsDirectoryW
GlobalLock
SetHandleInformation
GetProfileSectionA
CancelWaitableTimer
GetModuleHandleW
GetCommandLineA
ActivateActCtx
GlobalAlloc
LoadLibraryW
TerminateThread
GetConsoleAliasExesLengthW
GetCompressedFileSizeA
GetSystemDirectoryA
CompareStringW
lstrlenW
SetThreadPriority
WritePrivateProfileStringW
DeactivateActCtx
GetNamedPipeHandleStateW
GetPrivateProfileIntW
VerifyVersionInfoW
CreateDirectoryA
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetLastError
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
GetProcessHeaps
SetStdHandle
EnterCriticalSection
DisableThreadLibraryCalls
GetPrivateProfileStringA
Process32FirstW
SetSystemTime
SetEnvironmentVariableA
GetOEMCP
FindNextFileA
WriteProfileStringA
FindFirstChangeNotificationA
QueryMemoryResourceNotification
FreeEnvironmentStringsW
EnumResourceNamesA
WriteProfileStringW
GetCurrentDirectoryA
GetCurrentThreadId
GetCPInfoExA
FindAtomW
UnregisterWaitEx
LCMapStringW
GetVolumeInformationW
CreateFileA
GetConsoleOutputCP
MultiByteToWideChar
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
DeleteCriticalSection
GetACP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
WideCharToMultiByte
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetStringTypeW
GetLocaleInfoA
LoadLibraryA
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointer
CloseHandle
WriteConsoleA
user32
GetMenuItemID
winhttp
WinHttpWriteData
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 19.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ