C:\zonifojize-15\dahu suyevagih-wige\vako-72\gulexeyilot\cam.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f0c4e793957b0d1edd2408476e864fa88aac3253275a636524c69508c6ee4162.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0c4e793957b0d1edd2408476e864fa88aac3253275a636524c69508c6ee4162.exe
Resource
win10v2004-20241007-en
General
-
Target
f0c4e793957b0d1edd2408476e864fa88aac3253275a636524c69508c6ee4162
-
Size
185KB
-
MD5
a5e6406eba902784501db05cbd2be89b
-
SHA1
1176ea0ecf2d9bebf5903c6a2856f916f3410484
-
SHA256
f0c4e793957b0d1edd2408476e864fa88aac3253275a636524c69508c6ee4162
-
SHA512
6c25db16ec83d1bca1dd3a1c8a2e7a33db9270031cfd97ad57d36a200b31e9c9f451f5d8a78b653eb4a9f22a28f7d8fc3f078d080e8630e5d2fc6c2c1285342a
-
SSDEEP
3072:Vln8NABxVWWNJcg5k5v81CNnH5B21bMX+hKKCUxPEuX/Xz:V9hffNUl8qUbMX+hKK5xPbP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f0c4e793957b0d1edd2408476e864fa88aac3253275a636524c69508c6ee4162
Files
-
f0c4e793957b0d1edd2408476e864fa88aac3253275a636524c69508c6ee4162.exe windows:5 windows x86 arch:x86
5b7cf1305fbc3fab39b1980560b94650
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LocalFlags
FindNextFileA
WriteConsoleInputW
EnumDateFormatsA
OpenMutexA
GetConsoleAliasesLengthW
CopyFileExW
ReadConsoleOutputCharacterA
SetVolumeLabelA
GetEnvironmentStrings
VerifyVersionInfoW
QueryDosDeviceA
EnumCalendarInfoExA
RequestWakeupLatency
LocalSize
TlsGetValue
CreateFileA
GetMailslotInfo
GetWindowsDirectoryW
GetModuleHandleW
VirtualFree
FindNextVolumeMountPointA
CreateDirectoryExW
GetLogicalDriveStringsW
ReadConsoleInputW
FindNextVolumeMountPointW
OpenWaitableTimerA
TransactNamedPipe
SearchPathA
IsSystemResumeAutomatic
CallNamedPipeA
GetCurrentDirectoryA
GetDriveTypeA
CreateMailslotW
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
GlobalAlloc
MoveFileWithProgressA
GetBinaryTypeA
EnumSystemCodePagesW
GetCommandLineW
InterlockedDecrement
FindFirstChangeNotificationW
CancelTimerQueueTimer
GetConsoleTitleW
CopyFileW
CreateTimerQueueTimer
FindResourceA
FormatMessageA
CreateJobObjectA
GetConsoleFontSize
FindFirstVolumeA
InterlockedIncrement
GetACP
HeapWalk
EnumDateFormatsW
InterlockedExchangeAdd
GetConsoleTitleA
InterlockedCompareExchange
EnumCalendarInfoA
GetConsoleAliasExesLengthW
InterlockedExchange
GetEnvironmentStringsW
GetVolumeNameForVolumeMountPointW
SetCalendarInfoA
TerminateThread
MoveFileW
AddAtomW
FreeEnvironmentStringsA
SetConsoleTitleW
SetVolumeMountPointA
GetAtomNameW
SetConsoleActiveScreenBuffer
GetOEMCP
GetProcessIoCounters
GlobalFindAtomW
GetTickCount
GetThreadSelectorEntry
LoadLibraryW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
GetCommandLineA
GetStartupInfoA
HeapAlloc
GetLastError
HeapFree
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
IsValidCodePage
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
ReadFile
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CloseHandle
DeleteFileA
user32
GetMessageExtraInfo
GetComboBoxInfo
gdi32
GetBoundsRect
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 35.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ