C:\dozu\zuzezumoka\zaricimebo\gipuy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
eb543eb7524568ae501966ff4ffe175e48bf3985.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
eb543eb7524568ae501966ff4ffe175e48bf3985.exe
Resource
win10v2004-20241007-en
General
-
Target
eb543eb7524568ae501966ff4ffe175e48bf3985
-
Size
273KB
-
MD5
e18772840bb52e65f18efdb8b14ae516
-
SHA1
eb543eb7524568ae501966ff4ffe175e48bf3985
-
SHA256
b2e19e715623c054220ea5ea4e01979bf43e2c78f6fdab5ee9d20e072aba5a41
-
SHA512
720b274fbcaca3d31fd603fd5ee2d9b0b4217987995383a40b3d6b12d90694a488315d95e4f92ecb9c2abd98b9f7b2bde8f37744179b995acc08c5025f6ab34b
-
SSDEEP
6144:75W+ksp0b9Rjw+eOQnHFJJhTWNOhAvYm:N9p05Rjw+GH/uNo8z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource eb543eb7524568ae501966ff4ffe175e48bf3985
Files
-
eb543eb7524568ae501966ff4ffe175e48bf3985.exe windows:5 windows x86 arch:x86
22991cdf80531e1a8bd9d886f1a9df50
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindNextFileW
CopyFileExA
VerifyVersionInfoA
ReadConsoleOutputCharacterW
FlushConsoleInputBuffer
UnlockFile
GetProfileSectionA
VerifyVersionInfoW
QueryDosDeviceW
OpenThread
SetProcessPriorityBoost
GlobalGetAtomNameA
lstrlenA
FindNextVolumeMountPointA
GlobalDeleteAtom
WriteConsoleInputW
FindResourceA
GetComputerNameExW
OpenEventW
CallNamedPipeW
GetModuleHandleA
GetSystemDirectoryA
GetCurrentDirectoryW
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleW
VirtualAlloc
SetMailslotInfo
GetDiskFreeSpaceExA
WriteConsoleW
GetCommandLineA
GetCalendarInfoW
SearchPathA
CreateActCtxW
FormatMessageA
InitializeCriticalSection
GetSystemDefaultLangID
GetConsoleAliasesLengthA
WriteProfileSectionW
AddAtomA
InterlockedIncrement
HeapSize
_hread
GetStartupInfoA
CreateMailslotW
MultiByteToWideChar
GetSystemWow64DirectoryA
GetLastError
EnumDateFormatsW
DebugBreak
GetTickCount
LoadLibraryW
LoadLibraryA
SetLastError
GetDefaultCommConfigA
GetConsoleAliasesLengthW
GetComputerNameA
EnumSystemLocalesA
DeleteCriticalSection
LocalFileTimeToFileTime
SearchPathW
GetComputerNameExA
FindNextFileA
ResetEvent
LockFile
CreateMutexA
FindResourceW
SetCommState
FormatMessageW
InterlockedExchangeAdd
CreateFiber
GetConsoleSelectionInfo
GlobalAlloc
GetFileSizeEx
HeapAlloc
GetFileAttributesA
GetSystemWindowsDirectoryW
GetAtomNameW
GetComputerNameW
ReadConsoleInputA
GetPrivateProfileStructA
_hwrite
GetConsoleAliasA
OpenWaitableTimerA
FillConsoleOutputCharacterA
PrepareTape
AddAtomW
SetCurrentDirectoryW
SetCalendarInfoW
CreateFileA
CloseHandle
GetConsoleAliasExesLengthA
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
RaiseException
GetStartupInfoW
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
Sleep
InterlockedDecrement
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
SetHandleCount
GetFileType
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapReAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
OutputDebugStringW
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
user32
GetMenuInfo
GetMenuItemID
LoadMenuW
CharUpperW
GetListBoxInfo
GetCursorInfo
advapi32
AbortSystemShutdownW
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 40.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ