C:\pamoyibuti-35 lebohule\baroyozoxa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f932d7b45d644c8f153dc8eb4a7090958a31fb5d699f792719634884ce8d97a6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f932d7b45d644c8f153dc8eb4a7090958a31fb5d699f792719634884ce8d97a6.exe
Resource
win10v2004-20241007-en
General
-
Target
f932d7b45d644c8f153dc8eb4a7090958a31fb5d699f792719634884ce8d97a6
-
Size
277KB
-
MD5
1bc2829ca02efb5747e6617421258cda
-
SHA1
d9b93235409ff4b82e0b5665f27fff337724cf31
-
SHA256
f932d7b45d644c8f153dc8eb4a7090958a31fb5d699f792719634884ce8d97a6
-
SHA512
4cb5f4b9adedb35e9958aa44c50b5767622843931400dd995c80c9a81400486b2eb4576ae72e76dd806046aae0a04dcdd2895c896a0d91f76c9414201742e533
-
SSDEEP
6144:MxsgNS0lDNDoGXCstYeDl0KSr5Y7jBNkWBTqFe:MugN3DjXHtYeDl0KWOjBdWI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f932d7b45d644c8f153dc8eb4a7090958a31fb5d699f792719634884ce8d97a6
Files
-
f932d7b45d644c8f153dc8eb4a7090958a31fb5d699f792719634884ce8d97a6.exe windows:5 windows x86 arch:x86
e4c1b729a6a6c26957f366f6e05b141c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitAtomTable
FindNextVolumeA
EnterCriticalSection
GetNamedPipeHandleStateW
GetQueuedCompletionStatus
FillConsoleOutputCharacterA
SetThreadAffinityMask
TerminateProcess
GetCurrentProcessId
GetVersionExA
EnumDateFormatsExA
EnumResourceNamesA
FindNextFileW
CopyFileExW
BuildCommDCBAndTimeoutsW
DebugSetProcessKillOnExit
WritePrivateProfileStructA
MapViewOfFileEx
CreateTimerQueue
ReadConsoleInputA
GetSystemDirectoryA
GetDriveTypeA
BuildCommDCBAndTimeoutsA
LoadLibraryA
GlobalAlloc
VerifyVersionInfoW
GetBinaryTypeA
InterlockedExchange
FindFirstChangeNotificationA
FormatMessageW
SetDllDirectoryA
GetNamedPipeHandleStateA
WritePrivateProfileStringA
GetConsoleAliasesLengthW
GetProcessHeap
OpenWaitableTimerW
UnlockFile
InterlockedIncrement
GetStartupInfoA
GetSystemWow64DirectoryW
SetLastError
GetConsoleAliasExesA
ContinueDebugEvent
EndUpdateResourceA
GetLastError
FlushConsoleInputBuffer
SetDefaultCommConfigW
VirtualFree
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryA
CopyFileA
TerminateThread
GetOEMCP
FindAtomA
HeapUnlock
GetMailslotInfo
CreateActCtxW
GetConsoleAliasW
_lwrite
CreateIoCompletionPort
CreateNamedPipeA
SetSystemTimeAdjustment
DefineDosDeviceW
GetAtomNameW
SetConsoleScreenBufferSize
EnumResourceTypesW
lstrlenA
LoadLibraryW
WriteConsoleW
VirtualProtect
lstrcpyA
GetModuleHandleW
ReadConsoleOutputW
GetThreadContext
BuildCommDCBA
AddRefActCtx
GetStringTypeA
WritePrivateProfileStringW
GetFileAttributesW
GetVolumePathNameW
MoveFileW
GetCommMask
CloseHandle
LockFile
FindActCtxSectionStringA
GetNamedPipeInfo
FreeConsole
GlobalGetAtomNameW
SetComputerNameW
GetConsoleAliasesW
WriteConsoleInputW
CreateMailslotW
SystemTimeToTzSpecificLocalTime
SetLocalTime
GetStringTypeExA
EnumSystemLocalesA
CallNamedPipeW
FindActCtxSectionStringW
CopyFileExA
ResetWriteWatch
GetPrivateProfileIntW
GetModuleHandleExW
GetConsoleAliasExesLengthW
GetTickCount
OpenWaitableTimerA
GetConsoleAliasesLengthA
GlobalWire
FillConsoleOutputCharacterW
GetCompressedFileSizeA
SetThreadPriority
FreeUserPhysicalPages
WriteConsoleOutputCharacterA
EnumDateFormatsA
TerminateJobObject
CreateFileW
GetDateFormatW
GetBinaryTypeW
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
GetCommandLineA
HeapValidate
IsBadReadPtr
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
DebugBreak
GetStdHandle
WriteFile
OutputDebugStringA
GetFileType
OutputDebugStringW
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
CreateFileA
user32
GetCaretBlinkTime
Sections
.text Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ