C:\nufocopudas74\goxi_8\yijivoc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8ef633cda04c416471a6c17846a62d3e58f9ddb36a2d99e6bb9929c474ec7b32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ef633cda04c416471a6c17846a62d3e58f9ddb36a2d99e6bb9929c474ec7b32.exe
Resource
win10v2004-20241007-en
General
-
Target
8ef633cda04c416471a6c17846a62d3e58f9ddb36a2d99e6bb9929c474ec7b32
-
Size
295KB
-
MD5
19b1e426cc4ab99a312fcb8fea7f9d21
-
SHA1
82690959a5c80ad6372c36e96c543aff8c04988c
-
SHA256
8ef633cda04c416471a6c17846a62d3e58f9ddb36a2d99e6bb9929c474ec7b32
-
SHA512
d715ececfe5eef24110238a3eeb952d7a6d1a5bd0a7dacaa5d56d5335c04b73974b9496609e6b6a4a7967b5184f04ca54b8e5b5f0949e1ad157d0da969e2c212
-
SSDEEP
6144:+NR7L1ok83BMDdf+Ukuf+IanX59EPCmK:QR7BoaW6NaX59Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8ef633cda04c416471a6c17846a62d3e58f9ddb36a2d99e6bb9929c474ec7b32
Files
-
8ef633cda04c416471a6c17846a62d3e58f9ddb36a2d99e6bb9929c474ec7b32.exe windows:5 windows x86 arch:x86
7449bb1bd2f7cf11b31b665cb048bd37
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
SetLocalTime
EndUpdateResourceW
InterlockedIncrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetEnvironmentStringsW
WaitForSingleObject
AddConsoleAliasW
SetVolumeMountPointW
EnumCalendarInfoExW
ReadConsoleW
WriteFile
GetUserDefaultLangID
GetEnvironmentStrings
GlobalAlloc
WriteConsoleOutputA
GetVersionExW
lstrcpynW
PulseEvent
VerifyVersionInfoA
HeapQueryInformation
GetModuleFileNameW
GetACP
LCMapStringA
GetProcAddress
GetComputerNameExW
VerLanguageNameA
CreateTimerQueueTimer
FreeUserPhysicalPages
EnterCriticalSection
GetDefaultCommConfigA
GetModuleHandleA
QueueUserWorkItem
GetConsoleTitleW
VirtualProtect
PeekConsoleInputA
GetCPInfoExA
ReadConsoleInputW
FindNextVolumeA
CreateThread
GetCommandLineW
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
GetStringTypeW
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameA
HeapAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
VirtualAlloc
HeapSize
FreeEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
user32
RealGetWindowClassW
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ