C:\xonafobozaxug-gonufuxir67 jigatiwat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7d68f4995918932ae200b65bfdc779757ae5871b3c25ed070059fcd1693135df.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7d68f4995918932ae200b65bfdc779757ae5871b3c25ed070059fcd1693135df.exe
Resource
win10v2004-20241007-en
General
-
Target
7d68f4995918932ae200b65bfdc779757ae5871b3c25ed070059fcd1693135df
-
Size
410KB
-
MD5
c81e2241b41a33fe2dfe60361a303c37
-
SHA1
414636e220a3a21b5731b8f1dda10b59cd8b9517
-
SHA256
7d68f4995918932ae200b65bfdc779757ae5871b3c25ed070059fcd1693135df
-
SHA512
bb3e7a794ce8b2513f61f497c008f62fdd48fb2071e205d79657691ee196629dda6ffcd02ad9ca4157f4bb995601f6d79e9377a7b094b6c80612dac3fac16807
-
SSDEEP
6144:kMRBC/R6TE/iRAtvdnm4iYVC0dbflCZjmUdhTjMmhIkzHf0KRGGDkTB5wCuPG1:AW6tc4iGCyfIZjmFmikzHf0D0kTFiG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7d68f4995918932ae200b65bfdc779757ae5871b3c25ed070059fcd1693135df
Files
-
7d68f4995918932ae200b65bfdc779757ae5871b3c25ed070059fcd1693135df.exe windows:5 windows x86 arch:x86
2f9c37997e4f6c022f6907755dbb312e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstVolumeW
ExitProcess
GetExitCodeProcess
DeactivateActCtx
GetVersionExW
VerifyVersionInfoA
GetPrivateProfileStringW
GetConsoleCP
TlsGetValue
GetConsoleMode
CopyFileExW
VerLanguageNameW
FindFirstChangeNotificationW
FreeEnvironmentStringsW
RequestWakeupLatency
SetVolumeMountPointW
GetLongPathNameW
SetConsoleCursorInfo
GlobalHandle
SystemTimeToTzSpecificLocalTime
SetProcessShutdownParameters
CompareStringW
LocalLock
GetNamedPipeHandleStateW
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
LocalAlloc
Sleep
MoveFileExA
GetCommandLineW
InterlockedDecrement
InterlockedExchange
DeleteFileW
GetVolumePathNamesForVolumeNameA
GetPrivateProfileStringA
GetPrivateProfileIntW
HeapValidate
GetProcessHeaps
CreateNamedPipeW
GetCPInfoExA
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryA
GetCalendarInfoA
GetLastError
GetStringTypeA
FatalAppExitA
GetThreadSelectorEntry
WaitForDebugEvent
ReadFileScatter
GetTempPathW
GetDefaultCommConfigW
UnmapViewOfFile
GlobalWire
WritePrivateProfileSectionW
TerminateThread
lstrcatW
VirtualLock
CreateActCtxW
InterlockedPopEntrySList
OutputDebugStringW
SetConsoleTitleA
DefineDosDeviceW
LoadLibraryA
WritePrivateProfileStringW
WaitNamedPipeW
InterlockedIncrement
TerminateProcess
SetConsoleMode
PeekConsoleInputW
ReadConsoleOutputW
GetNumaProcessorNode
DuplicateHandle
GetPrivateProfileSectionNamesA
EnumTimeFormatsA
SetLocalTime
FindNextFileA
FindFirstFileW
CreateSemaphoreA
OutputDebugStringA
lstrcpyW
HeapSetInformation
CreateHardLinkA
SetThreadExecutionState
GetSystemTime
LockFile
EnumCalendarInfoExA
MoveFileExW
GetVolumePathNamesForVolumeNameW
SetConsoleScreenBufferSize
SearchPathA
GetOverlappedResult
IsBadStringPtrA
GetAtomNameW
GetConsoleAliasExesLengthA
WriteConsoleInputA
LocalUnlock
SetCommConfig
_lopen
EnumSystemLocalesA
GetCommState
SetEndOfFile
GetWriteWatch
UnhandledExceptionFilter
OpenSemaphoreA
GetConsoleScreenBufferInfo
EnumDateFormatsW
GetSystemTimeAdjustment
ZombifyActCtx
GetComputerNameA
HeapCompact
CommConfigDialogA
GetModuleFileNameA
OpenMutexA
AllocateUserPhysicalPages
FindResourceA
DeleteTimerQueueTimer
EnumResourceNamesA
CreateTimerQueueTimer
GetProcessTimes
UnregisterWait
IsBadWritePtr
GetCurrentProcessId
FatalAppExitW
GetFileAttributesA
lstrcpynW
SetNamedPipeHandleState
WriteConsoleOutputAttribute
GetCompressedFileSizeA
SetFileShortNameA
GetFullPathNameW
WriteProfileStringW
AddVectoredExceptionHandler
GlobalAddAtomA
EnumDateFormatsExW
TerminateJobObject
QueryDosDeviceA
LeaveCriticalSection
GetBinaryTypeA
SetCurrentDirectoryA
CloseHandle
CreateFileW
GetNumberFormatW
OpenFileMappingA
EncodePointer
DecodePointer
MoveFileA
GetStartupInfoW
IsBadReadPtr
GetModuleHandleW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
EnterCriticalSection
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
GetCurrentProcess
IsDebuggerPresent
HeapFree
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
LoadLibraryW
RtlUnwind
WriteConsoleW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
RaiseException
SetStdHandle
FlushFileBuffers
user32
GetCursorInfo
gdi32
GetBitmapBits
Sections
.text Size: 303KB - Virtual size: 303KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 561KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ