C:\bovoda23\yoyitajiyimi jala\dizoliy\gezuzix\lekezaha.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e78767db61043ce9cc7e4b1b6c4b712c6c1f4b577d32545ea4d66de9b7e0903c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e78767db61043ce9cc7e4b1b6c4b712c6c1f4b577d32545ea4d66de9b7e0903c.exe
Resource
win10v2004-20241007-en
General
-
Target
e78767db61043ce9cc7e4b1b6c4b712c6c1f4b577d32545ea4d66de9b7e0903c
-
Size
372KB
-
MD5
0130c11b53ec26b4b37ee0dceda90799
-
SHA1
5e54145ebcfe4aab336ccd204b72d29d65fc6ee3
-
SHA256
e78767db61043ce9cc7e4b1b6c4b712c6c1f4b577d32545ea4d66de9b7e0903c
-
SHA512
d3a53773e3058b2bc26a865870a543d623dcc41192b26b69e7307d00bbc1858e3350ffdb954e093d5146c1c8a763e704b0d8f2ffa16eaa76319862f632ae1516
-
SSDEEP
6144:VOcEdYILn7QQDifPeIY4yow1+feGFllCYEDHcM6++ra9n:VO9pD7QYifPzYnzY3UDI+6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e78767db61043ce9cc7e4b1b6c4b712c6c1f4b577d32545ea4d66de9b7e0903c
Files
-
e78767db61043ce9cc7e4b1b6c4b712c6c1f4b577d32545ea4d66de9b7e0903c.exe windows:5 windows x86 arch:x86
e4d0e735c5b80d8efd3c6090a334e0c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetThreadContext
GetConsoleAliasExesLengthA
OpenJobObjectA
WaitNamedPipeA
AddConsoleAliasW
GetSystemDefaultLCID
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
SetCommState
LoadLibraryW
CopyFileW
GetFileAttributesA
GetFileAttributesW
GetVolumePathNameA
lstrlenW
GetTempPathW
LCMapStringA
GetLastError
GetProcAddress
VirtualAlloc
WriteProfileSectionA
SetComputerNameA
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
CreateHardLinkW
SetProcessWorkingSetSize
OpenJobObjectW
GetModuleHandleA
CreateMutexA
FindNextFileW
GetFileAttributesExW
AddConsoleAliasA
LCMapStringW
MultiByteToWideChar
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
CloseHandle
RaiseException
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
SetEndOfFile
GetProcessHeap
ReadFile
GetConsoleOutputCP
WriteConsoleW
shell32
CommandLineToArgvW
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 171KB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ