C:\lasizuzujo\tiwumeji\ze.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a49103ea829c909f7c0d3ae4e17a4c5fc0aefebf.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a49103ea829c909f7c0d3ae4e17a4c5fc0aefebf.exe
Resource
win10v2004-20241007-en
General
-
Target
a49103ea829c909f7c0d3ae4e17a4c5fc0aefebf
-
Size
277KB
-
MD5
0c03d468a1b99542c5a2ebe78cd0aac9
-
SHA1
a49103ea829c909f7c0d3ae4e17a4c5fc0aefebf
-
SHA256
e54f1471b23475f1a06781918916f76d529be9e4577c71e4e26c6e37a9bf6310
-
SHA512
7db34c6f68bf393681cf446496f80571edb8a154cdb3ddf49741d256de9f487731163b769a68a4f1efb893be84cb2a4aa536fec48b8bcb0ab0abe2cc838e1177
-
SSDEEP
6144:gVd/aipfYxZCrtywmvu9s8rIpsm3CiCeuicTy9:gz/a4YPotywmvuf0s3iuicG9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a49103ea829c909f7c0d3ae4e17a4c5fc0aefebf
Files
-
a49103ea829c909f7c0d3ae4e17a4c5fc0aefebf.exe windows:5 windows x86 arch:x86
e4c1b729a6a6c26957f366f6e05b141c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitAtomTable
FindNextVolumeA
EnterCriticalSection
GetNamedPipeHandleStateW
GetQueuedCompletionStatus
FillConsoleOutputCharacterA
SetThreadAffinityMask
TerminateProcess
GetCurrentProcessId
GetVersionExA
EnumDateFormatsExA
EnumResourceNamesA
FindNextFileW
CopyFileExW
BuildCommDCBAndTimeoutsW
DebugSetProcessKillOnExit
WritePrivateProfileStructA
MapViewOfFileEx
CreateTimerQueue
ReadConsoleInputA
GetSystemDirectoryA
GetDriveTypeA
BuildCommDCBAndTimeoutsA
LoadLibraryA
GlobalAlloc
VerifyVersionInfoW
GetBinaryTypeA
InterlockedExchange
FindFirstChangeNotificationA
FormatMessageW
SetDllDirectoryA
GetNamedPipeHandleStateA
WritePrivateProfileStringA
GetConsoleAliasesLengthW
GetProcessHeap
OpenWaitableTimerW
UnlockFile
InterlockedIncrement
GetStartupInfoA
GetSystemWow64DirectoryW
SetLastError
GetConsoleAliasExesA
ContinueDebugEvent
EndUpdateResourceA
GetLastError
FlushConsoleInputBuffer
SetDefaultCommConfigW
VirtualFree
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryA
CopyFileA
TerminateThread
GetOEMCP
FindAtomA
HeapUnlock
GetMailslotInfo
CreateActCtxW
GetConsoleAliasW
_lwrite
CreateIoCompletionPort
CreateNamedPipeA
SetSystemTimeAdjustment
DefineDosDeviceW
GetAtomNameW
SetConsoleScreenBufferSize
EnumResourceTypesW
lstrlenA
LoadLibraryW
WriteConsoleW
VirtualProtect
lstrcpyA
GetModuleHandleW
ReadConsoleOutputW
GetThreadContext
BuildCommDCBA
AddRefActCtx
GetStringTypeA
WritePrivateProfileStringW
GetFileAttributesW
GetVolumePathNameW
MoveFileW
GetCommMask
CloseHandle
LockFile
FindActCtxSectionStringA
GetNamedPipeInfo
FreeConsole
GlobalGetAtomNameW
SetComputerNameW
GetConsoleAliasesW
WriteConsoleInputW
CreateMailslotW
SystemTimeToTzSpecificLocalTime
SetLocalTime
GetStringTypeExA
EnumSystemLocalesA
CallNamedPipeW
FindActCtxSectionStringW
CopyFileExA
ResetWriteWatch
GetPrivateProfileIntW
GetModuleHandleExW
GetConsoleAliasExesLengthW
GetTickCount
OpenWaitableTimerA
GetConsoleAliasesLengthA
GlobalWire
FillConsoleOutputCharacterW
GetCompressedFileSizeA
SetThreadPriority
FreeUserPhysicalPages
WriteConsoleOutputCharacterA
EnumDateFormatsA
TerminateJobObject
CreateFileW
GetDateFormatW
GetBinaryTypeW
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
GetCommandLineA
HeapValidate
IsBadReadPtr
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
DebugBreak
GetStdHandle
WriteFile
OutputDebugStringA
GetFileType
OutputDebugStringW
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
CreateFileA
user32
GetCaretBlinkTime
Sections
.text Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ