C:\yihoz ricujog\bivalazon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
93bacab663269c48bc12e8d1d0e0433c0d5bf38c82336e8d117acd6972d1ae49.exe
Resource
win7-20241010-en
General
-
Target
93bacab663269c48bc12e8d1d0e0433c0d5bf38c82336e8d117acd6972d1ae49
-
Size
395KB
-
MD5
ae995017207df0e8bd578a1fe7e5a47b
-
SHA1
c89cc73941f2df8bb07791a437ff628f3284f4c6
-
SHA256
93bacab663269c48bc12e8d1d0e0433c0d5bf38c82336e8d117acd6972d1ae49
-
SHA512
16a1fe4fee95086161ddebff35039e28b175d88d15c8e75cf4f081d1b2e101266c4c9954891a1884dd379afce7714980d95880cb3e3c3270e6a4fd50060df65d
-
SSDEEP
6144:Au9siA10OHXGWYpocwCNGf9iQJaP+/t5h7oEsTFF7Z4CFL1:Lsf1z3G1ochNw9bdrCFF7bJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 93bacab663269c48bc12e8d1d0e0433c0d5bf38c82336e8d117acd6972d1ae49
Files
-
93bacab663269c48bc12e8d1d0e0433c0d5bf38c82336e8d117acd6972d1ae49.exe windows:5 windows x86 arch:x86
7e41612e1e386255ee88886121b77ed9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
FileTimeToDosDateTime
EnumResourceNamesW
FindFirstChangeNotificationW
CopyFileExW
SetLocalTime
GetCPInfo
GetConsoleAliasExesLengthA
HeapAlloc
InterlockedIncrement
GetCommState
InterlockedDecrement
GlobalSize
GetSystemWindowsDirectoryW
GlobalLock
GetProfileSectionA
GetModuleHandleW
GetTickCount
GetPrivateProfileStringW
ReadConsoleW
TlsSetValue
ActivateActCtx
GlobalAlloc
GetVolumeInformationA
LoadLibraryW
TerminateThread
IsProcessorFeaturePresent
GetCompressedFileSizeA
lstrlenW
SetThreadPriority
DeactivateActCtx
GetNamedPipeHandleStateW
LCMapStringA
GetPrivateProfileIntW
CreateDirectoryA
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetStdHandle
GetLastError
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
EnterCriticalSection
CreateMemoryResourceNotification
DisableThreadLibraryCalls
Process32FirstW
WritePrivateProfileStringA
SetCurrentDirectoryW
HeapWalk
FindAtomA
SetSystemTime
SetEnvironmentVariableA
FreeEnvironmentStringsW
EnumResourceNamesA
FindNextFileW
GetStringTypeW
WriteProfileStringW
CompareStringA
GetCurrentThreadId
GetCPInfoExA
GetVersionExA
UnregisterWaitEx
TlsFree
FlushFileBuffers
CloseHandle
MultiByteToWideChar
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
DeleteCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
SetLastError
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
user32
GetMenuCheckMarkDimensions
winhttp
WinHttpCloseHandle
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 19.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ