C:\jevenisim.pdb
Static task
static1
Behavioral task
behavioral1
Sample
37dddea448a8ccbec1e53c988ecadf48f4a5e0460d7a51e7c6a09e5b474da46f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
37dddea448a8ccbec1e53c988ecadf48f4a5e0460d7a51e7c6a09e5b474da46f.exe
Resource
win10v2004-20241007-en
General
-
Target
37dddea448a8ccbec1e53c988ecadf48f4a5e0460d7a51e7c6a09e5b474da46f
-
Size
433KB
-
MD5
a851348a1c7a29414e6a9c519bec117d
-
SHA1
581043e3d8ba6d357d1fa171dffe2390e9bbaccb
-
SHA256
37dddea448a8ccbec1e53c988ecadf48f4a5e0460d7a51e7c6a09e5b474da46f
-
SHA512
8d37672f93e10dadd07fa378f4ca00be277ba0be8a5f2398493cf7f5416811aae4d79e3183ceb2ac4903ed03d3d6205da656bd92f54bda29ae334061c2c721ba
-
SSDEEP
6144:gkzT5Nf9ZbDnOgfq1HjKNi+Hn33b8poHwiMc4oKoN3:fT5XZ+gfqdjKNdHn33bAoHwQ4oKM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37dddea448a8ccbec1e53c988ecadf48f4a5e0460d7a51e7c6a09e5b474da46f
Files
-
37dddea448a8ccbec1e53c988ecadf48f4a5e0460d7a51e7c6a09e5b474da46f.exe windows:5 windows x86 arch:x86
9cae6f4a76061b40bb99bdb1c364f1a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstVolumeW
WaitForSingleObject
GetNamedPipeHandleStateA
CreateNamedPipeW
CallNamedPipeW
TerminateProcess
FatalExit
GetVersionExA
CopyFileExW
SetConsoleCP
VerifyVersionInfoA
VerLanguageNameW
FindFirstFileExW
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointA
GetLongPathNameW
CopyFileA
TlsGetValue
VerifyVersionInfoW
GetConsoleCursorInfo
SystemTimeToTzSpecificLocalTime
GetProcessShutdownParameters
ReleaseSemaphore
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
GlobalAlloc
Sleep
MoveFileW
GetCommandLineA
InterlockedDecrement
DeleteFileA
GetVolumePathNamesForVolumeNameW
SetFileAttributesA
GetPrivateProfileIntW
HeapSize
GetProcessHeap
CreateNamedPipeA
WriteConsoleOutputW
GetStartupInfoW
GetDiskFreeSpaceExW
GetCPInfoExW
GetWindowsDirectoryA
GetSystemWow64DirectoryA
GetProfileStringW
GetCalendarInfoA
SetLastError
GetExitCodeThread
DebugBreak
ReadFileScatter
ReadFile
SetDefaultCommConfigA
GetNumberOfConsoleMouseButtons
GlobalWire
GetSystemWow64DirectoryW
WriteProfileStringA
lstrcatW
FindCloseChangeNotification
CreateActCtxA
InterlockedPopEntrySList
OutputDebugStringW
InterlockedExchange
DefineDosDeviceA
LoadLibraryA
WriteConsoleW
SetSystemTimeAdjustment
GetConsoleMode
SetErrorMode
UnregisterWaitEx
PeekConsoleInputA
GetNumberFormatA
GetQueuedCompletionStatus
FindResourceExA
FindNextFileW
FindFirstFileA
FreeEnvironmentStringsA
SetLocalTime
EnumTimeFormatsW
CreateSemaphoreW
HeapSetInformation
SetFileShortNameA
lstrcpyA
HeapWalk
CreateHardLinkA
RaiseException
SetSystemTime
LockFile
EnumCalendarInfoExW
MoveFileExW
GetConsoleCP
SetConsoleScreenBufferSize
SearchPathW
FreeConsole
GetAtomNameW
GetConsoleAliasExesLengthW
WriteConsoleInputW
LocalLock
EnumDateFormatsW
SetCommState
GetSystemTimeAdjustment
EnumSystemLocalesW
GetNumaHighestNodeNumber
SetEndOfFile
GetWriteWatch
SetUnhandledExceptionFilter
OpenSemaphoreW
GetLargestConsoleWindowSize
ClearCommError
ReleaseActCtx
GetComputerNameA
HeapValidate
GetLastError
OpenMutexW
GetStringTypeA
SetSystemPowerState
VirtualUnlock
SetWaitableTimer
EnumResourceNamesA
CreateTimerQueueTimer
GetProcessTimes
RegisterWaitForSingleObject
IsBadWritePtr
GetCurrentProcessId
FatalAppExitA
GetFileAttributesW
lstrcpynW
DisconnectNamedPipe
FillConsoleOutputCharacterA
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetFullPathNameA
WriteProfileStringW
LockFileEx
LeaveCriticalSection
SetCurrentDirectoryA
GlobalAddAtomW
CloseHandle
CreateFileW
EncodePointer
DecodePointer
GetCommandLineW
IsProcessorFeaturePresent
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
InterlockedIncrement
ExitProcess
IsBadReadPtr
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
WriteFile
GetStdHandle
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
RtlUnwind
LoadLibraryW
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapQueryInformation
HeapFree
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
OutputDebugStringA
SetFilePointer
SetStdHandle
FlushFileBuffers
user32
GetMenuItemID
Sections
.text Size: 338KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 558KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ