C:\vuwulovek14\behujixazuguli\zarayom\zut_jujurecic42.pdb
Static task
static1
Behavioral task
behavioral1
Sample
54b342cab54a66842c75e8061dde646c1ce06247.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
54b342cab54a66842c75e8061dde646c1ce06247.exe
Resource
win10v2004-20241007-en
General
-
Target
54b342cab54a66842c75e8061dde646c1ce06247
-
Size
232KB
-
MD5
f919647759183e07c33e327759c1ea23
-
SHA1
54b342cab54a66842c75e8061dde646c1ce06247
-
SHA256
5dd8b3fb036735240645400bd556f5f85d34e8d863e0c1331b2addd444ec7136
-
SHA512
48464c48278b4c5ce00e576c8e5605bbda054ef93f87b6e2c8c4c4ce476e11866624b9b58b1b1a44c444948d781dd87356ccca3c4e6ad0bba251447b193edd97
-
SSDEEP
3072:LXO2aH7LJU8wQmW/FRL2dfCtQZ85oV0kCt6n/6oPaTJh7vQ1:j7I7LJAQm4R2dDZ8iV0zt6nSMaTP7v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 54b342cab54a66842c75e8061dde646c1ce06247
Files
-
54b342cab54a66842c75e8061dde646c1ce06247.exe windows:5 windows x86 arch:x86
40a4dcf55096fd2511a4f1eb7d8ccdb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateMutexW
GetStringTypeA
WriteConsoleOutputCharacterA
OpenJobObjectA
GetCommState
WaitNamedPipeA
SetComputerNameW
CreateHardLinkA
GetFileAttributesExA
GetModuleHandleW
GetTickCount
GetVolumePathNameW
GetPrivateProfileIntA
LoadLibraryW
GetFileAttributesA
GetFileAttributesW
WriteConsoleW
lstrlenW
LCMapStringA
SetProcessAffinityMask
GetProfileIntA
GetLastError
GetProcAddress
VirtualAlloc
CopyFileA
LoadLibraryA
WriteConsoleA
GetProcessWorkingSetSize
LocalAlloc
GetModuleHandleA
FindNextFileW
AddConsoleAliasA
GlobalReAlloc
SetFileAttributesW
LCMapStringW
GetConsoleAliasesW
GetSystemDefaultLangID
RaiseException
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
CreateFileA
MultiByteToWideChar
GetStringTypeW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
GetConsoleOutputCP
SetEndOfFile
GetProcessHeap
ReadFile
user32
ClientToScreen
advapi32
BackupEventLogW
winhttp
WinHttpSetTimeouts
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ