C:\kuja.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a9f024d0385e88a7338783b91f0e62130b851792339bfd1680d5e0458d834981.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a9f024d0385e88a7338783b91f0e62130b851792339bfd1680d5e0458d834981.exe
Resource
win10v2004-20241007-en
General
-
Target
a9f024d0385e88a7338783b91f0e62130b851792339bfd1680d5e0458d834981
-
Size
402KB
-
MD5
2a2b6bb848a5c68ad189cd3cab07931b
-
SHA1
78756d66ba2d22f51586cd8ecb8641b8c13ee8b8
-
SHA256
a9f024d0385e88a7338783b91f0e62130b851792339bfd1680d5e0458d834981
-
SHA512
9c76d8a47f1c3e9bb639284ee4345b906b9a300fbe9f2e12640d809e75a1a0d4741566d38d7a2d7cbc789cdee9f5e1d50229a721a13d07555b1aeec1c5b0fe27
-
SSDEEP
6144:R3+E5eZOkpmuvVXWHr1MkvfpNfsyhguZxFBoJerN:5+EqOk4uoL1bynFJerN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a9f024d0385e88a7338783b91f0e62130b851792339bfd1680d5e0458d834981
Files
-
a9f024d0385e88a7338783b91f0e62130b851792339bfd1680d5e0458d834981.exe windows:5 windows x86 arch:x86
7557c7025c3e52657fb1a28fcfb0e476
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetComputerNameA
GetDateFormatW
SetLocaleInfoA
FindActCtxSectionGuid
DeleteVolumeMountPointA
SetUnhandledExceptionFilter
SetMailslotInfo
GetProfileSectionA
SetEvent
GetConsoleAliasesLengthA
GetConsoleTitleA
SetFileTime
GetSystemTimes
GlobalAlloc
GetFirmwareEnvironmentVariableA
Sleep
GetStringTypeExW
DnsHostnameToComputerNameW
GetAtomNameW
LCMapStringA
InterlockedExchange
GetStdHandle
GetProcAddress
VirtualAlloc
PeekConsoleInputW
RemoveDirectoryA
SetFileAttributesA
LocalAlloc
GetModuleFileNameA
GetDefaultCommConfigA
GetModuleHandleA
UpdateResourceW
GetConsoleProcessList
lstrcpyW
SwitchToThread
GetCommandLineA
GetStartupInfoA
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RtlUnwind
GetLastError
SetFilePointer
HeapFree
CloseHandle
GetModuleHandleW
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
CreateFileA
ReadFile
SetStdHandle
FlushFileBuffers
LoadLibraryA
RaiseException
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
HeapSize
winhttp
WinHttpOpen
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 256KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ