C:\xugobev30\jucimewoc\rayajezoxeboho.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2e26fbc72e80531ea6b7a2b07c69f9808054e17097357d15905c09208f894183.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e26fbc72e80531ea6b7a2b07c69f9808054e17097357d15905c09208f894183.exe
Resource
win10v2004-20241007-en
General
-
Target
2e26fbc72e80531ea6b7a2b07c69f9808054e17097357d15905c09208f894183
-
Size
276KB
-
MD5
15617ea8f51d9042d096e4782da0aca8
-
SHA1
266c0658ab66b398ab00980336db5b08609b7c5f
-
SHA256
2e26fbc72e80531ea6b7a2b07c69f9808054e17097357d15905c09208f894183
-
SHA512
2cb9b1b809e1fa57df8b9a1555631ba66821afc2c9105e2ce33cdaea553a0c991e6e9ef2023c85c064cdb3b89e5e3ce4cc9b34dc4bf8e1e2160489a40647e22d
-
SSDEEP
6144:bncwoA4rCIKpwxC4Wg2YQrFhQC+0h3OFUi:bncwgrvKpwxC4WZrFhF+yAU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e26fbc72e80531ea6b7a2b07c69f9808054e17097357d15905c09208f894183
Files
-
2e26fbc72e80531ea6b7a2b07c69f9808054e17097357d15905c09208f894183.exe windows:5 windows x86 arch:x86
47d6d0e32e585b2fea6e24ee5e09452f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InitAtomTable
FindNextVolumeA
EnterCriticalSection
GetNamedPipeHandleStateW
GetQueuedCompletionStatus
FillConsoleOutputCharacterA
SetThreadAffinityMask
TerminateProcess
GetCurrentProcessId
GetVersionExA
EnumDateFormatsExA
EnumResourceNamesA
FindNextFileW
CopyFileExW
BuildCommDCBAndTimeoutsW
DebugSetProcessKillOnExit
WritePrivateProfileStructA
MapViewOfFileEx
CreateTimerQueue
ReadConsoleInputA
GetSystemDirectoryA
GetDriveTypeA
BuildCommDCBAndTimeoutsA
LoadLibraryA
GlobalAlloc
VerifyVersionInfoW
GetBinaryTypeA
InterlockedExchange
FindFirstChangeNotificationA
FormatMessageW
SetDllDirectoryA
GetNamedPipeHandleStateA
WritePrivateProfileStringA
GetConsoleAliasesLengthW
GetProcessHeap
OpenWaitableTimerW
UnlockFile
InterlockedIncrement
GetStartupInfoA
GetSystemWow64DirectoryW
SetLastError
GetConsoleAliasExesA
ContinueDebugEvent
EndUpdateResourceA
GetLastError
FlushConsoleInputBuffer
SetDefaultCommConfigW
VirtualFree
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryA
CopyFileA
TerminateThread
GetOEMCP
FindAtomA
HeapUnlock
SetMailslotInfo
CreateActCtxW
GetConsoleAliasW
_lwrite
CreateIoCompletionPort
CreateNamedPipeA
SetSystemTimeAdjustment
DefineDosDeviceW
GetAtomNameW
SetConsoleScreenBufferSize
EnumResourceTypesW
lstrlenA
LoadLibraryW
WriteConsoleW
VirtualProtect
lstrcpyA
GetModuleHandleW
ReadConsoleOutputW
GetThreadContext
BuildCommDCBA
AddRefActCtx
GetStringTypeA
WritePrivateProfileStringW
GetFileAttributesW
GetVolumePathNameW
MoveFileW
GetCommMask
CloseHandle
LockFile
FindActCtxSectionStringA
GetNamedPipeInfo
FreeConsole
GlobalGetAtomNameW
SetComputerNameW
GetConsoleAliasesW
WriteConsoleInputW
CreateMailslotW
SystemTimeToTzSpecificLocalTime
SetLocalTime
GetStringTypeExA
EnumSystemLocalesA
CallNamedPipeW
FindActCtxSectionStringW
CopyFileExA
ResetWriteWatch
GetPrivateProfileIntW
GetModuleHandleExW
GetConsoleAliasExesLengthW
GetTickCount
OpenWaitableTimerA
GetConsoleAliasesLengthA
GlobalWire
FillConsoleOutputCharacterW
GetCompressedFileSizeA
SetThreadPriority
FreeUserPhysicalPages
WriteConsoleOutputCharacterA
EnumDateFormatsA
TerminateJobObject
CreateFileW
GetDateFormatW
GetBinaryTypeW
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
GetStartupInfoW
HeapValidate
IsBadReadPtr
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
DebugBreak
GetStdHandle
WriteFile
OutputDebugStringA
GetFileType
OutputDebugStringW
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
GetModuleFileNameA
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
CreateFileA
user32
GetCaretBlinkTime
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ