C:\kohugic\nabuxewujab70\dataxoreyi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a948708e60fe0c202fb4b6e56f5a5d0a3b0a96ed27f8015b5a6d9991841fb3f4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a948708e60fe0c202fb4b6e56f5a5d0a3b0a96ed27f8015b5a6d9991841fb3f4.exe
Resource
win10v2004-20241007-en
General
-
Target
f74e5b472685b5f569d2cf5bdfc5d34572f1b3d2
-
Size
141KB
-
MD5
3638ae261332af2ed78206d2b17c708a
-
SHA1
f74e5b472685b5f569d2cf5bdfc5d34572f1b3d2
-
SHA256
21b5c4b262bc1828f17180c928c01de065d4c0d4725beebd300a31ba3e9b3dd3
-
SHA512
06f262ae3066fcc6d8f92412a08f3f949e0c9fe06221db9e0e50b2a4730bedb588533d9a34ce3548c7a68146eb7d1bfbd61ad5037a9f605dacf1ef43c4acabbc
-
SSDEEP
3072:Fhj5aS6CLiP9XWcTjXbWcHLo8TIDrpFeUIEBADKYEEmnd8n3ZjnFyJeNHfs/g:XV+VDjXjH/k/pFeUIEBA+ziFxKo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/a948708e60fe0c202fb4b6e56f5a5d0a3b0a96ed27f8015b5a6d9991841fb3f4
Files
-
f74e5b472685b5f569d2cf5bdfc5d34572f1b3d2.zip
-
a948708e60fe0c202fb4b6e56f5a5d0a3b0a96ed27f8015b5a6d9991841fb3f4.exe windows:5 windows x86 arch:x86
3be35b9541df7e97a48f1c30356bc7d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
VerSetConditionMask
SetLocaleInfoW
FindNextVolumeA
HeapWalk
GetNamedPipeHandleStateW
SystemTimeToFileTime
FillConsoleOutputCharacterW
CreateMailslotW
TerminateProcess
GetLastError
GetVersionExA
FreeResource
EnumResourceNamesA
FindNextFileA
CopyFileExW
BuildCommDCBW
SetDefaultCommConfigA
WriteProfileStringW
WritePrivateProfileStructW
LocalCompact
ChangeTimerQueueTimer
ReadConsoleInputA
WriteConsoleInputA
LoadResource
AddAtomA
SearchPathA
GetThreadTimes
CallNamedPipeW
GetDriveTypeA
BuildCommDCBAndTimeoutsW
VirtualProtect
GetModuleHandleA
GlobalAlloc
SetProcessPriorityBoost
GetProfileSectionW
DeleteFileW
FindFirstChangeNotificationA
VerifyVersionInfoA
FormatMessageA
SetDllDirectoryW
LoadLibraryA
WritePrivateProfileStringA
GetUserDefaultLCID
SetWaitableTimer
SetConsoleTextAttribute
InterlockedDecrement
GetStartupInfoW
GetSystemWow64DirectoryA
CopyFileW
SetCalendarInfoA
ContinueDebugEvent
EndUpdateResourceW
SetLastError
FreeLibraryAndExitThread
GetModuleFileNameW
FatalAppExitW
SetSystemTime
OpenFileMappingA
lstrcmpW
WriteFileGather
FlushConsoleInputBuffer
GetSystemTimeAdjustment
VirtualAllocEx
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryW
CopyFileA
GetACP
GlobalFindAtomW
lstrcatW
SetMailslotInfo
CreateActCtxW
GetPrivateProfileIntW
_lwrite
OutputDebugStringA
CreateNamedPipeA
GetAtomNameW
SetConsoleActiveScreenBuffer
EnumResourceTypesW
lstrlenA
DebugActiveProcessStop
WriteConsoleW
lstrcpyA
ReadConsoleOutputW
GetThreadContext
ReleaseActCtx
GetStringTypeA
GetPrivateProfileStringA
GetFileAttributesExA
LocalFileTimeToFileTime
MoveFileA
GetVolumePathNameA
GetCommMask
SetFileShortNameW
VerLanguageNameW
LockFile
ProcessIdToSessionId
GetQueuedCompletionStatus
AllocConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasExesLengthA
WriteConsoleInputW
SystemTimeToTzSpecificLocalTime
MoveFileWithProgressA
GetStringTypeExW
EnumSystemLocalesA
GetPrivateProfileIntA
GetModuleHandleW
OpenWaitableTimerA
GetConsoleAliasesLengthW
GlobalUnWire
FillConsoleOutputCharacterA
GetCompressedFileSizeA
FindNextVolumeMountPointA
SetThreadPriority
ReadConsoleW
MapUserPhysicalPagesScatter
WriteConsoleOutputCharacterW
QueryInformationJobObject
GetDateFormatW
GetConsoleAliasExesA
EnumDateFormatsA
SetDefaultCommConfigW
OpenMutexA
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
InterlockedIncrement
GetProcAddress
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
advapi32
InitiateSystemShutdownW
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ