C:\yawapih_yasayotemoyofu\ritajesenafume\duboyitefe\yufaxi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe
Resource
win10v2004-20241007-en
General
-
Target
2d30a2db0ac43921dfdf0228f738c0884bf0bd83
-
Size
158KB
-
MD5
b6fbb0dd67c9fd58bf9c7e60aeb3e9b8
-
SHA1
2d30a2db0ac43921dfdf0228f738c0884bf0bd83
-
SHA256
6315393be303ea65be6ff1c60814cbcba5cd8e51fdf07da4373d0599c8fb8ce7
-
SHA512
bd3abec9fce65232c4b0a11d60ed30aab1ef501edb5fe65af6472fb55a2113129fa84633d0f6ece7be35b2fb7ef6501565aadb51f1824d5a4075c0036c56158d
-
SSDEEP
3072:iDVrpJZEFMyHkcVTW68qdPPF+64iIFGRXDp5xwzuhwVrcrf2uq8CCSuEQJG9:SVJZKHhWQd3F549Gr52zumVwy8CWEP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1
Files
-
2d30a2db0ac43921dfdf0228f738c0884bf0bd83.zip
Password: infected
-
a041839327295fde3df12ea61374abd19c4499b87e211757c593179d6a6870d1.exe windows:5 windows x86 arch:x86
f1fc6bebd2ae7f3a8d696e55bbb6e33b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesA
MoveFileExA
SetEndOfFile
InterlockedDecrement
WaitNamedPipeA
WriteConsoleInputA
SetComputerNameW
CreateHardLinkA
GetTickCount
GetConsoleAliasesLengthA
GetGeoInfoW
WriteFile
GetConsoleCP
LoadLibraryW
Sleep
ReadConsoleInputA
AssignProcessToJobObject
HeapDestroy
GetFileAttributesA
EnumSystemCodePagesA
CreateMutexW
GetFileAttributesW
WriteConsoleW
GetSystemDirectoryA
lstrlenW
LCMapStringA
GetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
OpenWaitableTimerW
LocalAlloc
AddAtomW
CreateEventW
FindNextFileW
GetFileAttributesExW
LCMapStringW
GetConsoleAliasW
GetSystemDefaultLangID
HeapAlloc
GetModuleHandleW
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
HeapReAlloc
HeapCreate
GetStdHandle
GetModuleFileNameA
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
GetConsoleMode
MultiByteToWideChar
CloseHandle
CreateFileA
SetStdHandle
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetConsoleOutputCP
FlushFileBuffers
GetProcessHeap
ReadFile
RaiseException
advapi32
IsTokenUntrusted
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 40.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ