C:\punoheh\fexo71\zubelok 64_vimeyu-goge\vigucaxuyuw.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f0284c1bb8ff59f04b6a3c2f38c4de1a250f2d63d628ea3b45f6b4e5fcc1ba6e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0284c1bb8ff59f04b6a3c2f38c4de1a250f2d63d628ea3b45f6b4e5fcc1ba6e.exe
Resource
win10v2004-20241007-en
General
-
Target
683910de2c1514a1402e2fc5451cdc352ab44ae2
-
Size
273KB
-
MD5
0fcbfa203a6fe7b0c81a7239eec66755
-
SHA1
683910de2c1514a1402e2fc5451cdc352ab44ae2
-
SHA256
532fd6fecf71c7f9c68357d3137861edbeebdcd76ee0796ef206c58c03043926
-
SHA512
6c26fea9da888a7dd3efdbd75065a0f07f307bf1446e24f00873b92f2972af705af2151d224c93e6c47dd02ac13cdadda0e0b71207aa6236c2b7941021f5c24c
-
SSDEEP
6144:ixogbsQzIKDCy4ZMX4yP4hT2Y/EMMZHLHR+KA4zn:RgYbKDCy42XdP452GXMZH8x4zn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/f0284c1bb8ff59f04b6a3c2f38c4de1a250f2d63d628ea3b45f6b4e5fcc1ba6e
Files
-
683910de2c1514a1402e2fc5451cdc352ab44ae2.zip
-
f0284c1bb8ff59f04b6a3c2f38c4de1a250f2d63d628ea3b45f6b4e5fcc1ba6e.exe windows:5 windows x86 arch:x86
16c6db61a45b1cc9e03eb41acced74bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenMutexW
GetCurrentProcess
GetNamedPipeHandleStateW
GetQueuedCompletionStatus
FillConsoleOutputCharacterW
EnumSystemCodePagesW
LocalUnlock
GetVolumeNameForVolumeMountPointA
GetVersionExA
VerifyVersionInfoA
WriteConsoleInputA
EnumDateFormatsW
FindNextFileA
CopyFileExW
BuildCommDCBAndTimeoutsW
VirtualLock
WriteProfileStringA
VerifyVersionInfoW
GetFileInformationByHandle
DeleteFileA
FindNextVolumeMountPointW
TlsGetValue
LoadResource
WriteConsoleInputW
GetConsoleTitleA
GetComputerNameExW
OpenEventA
GetModuleHandleA
GetSystemDirectoryA
GetDriveTypeW
BuildCommDCBAndTimeoutsA
LoadLibraryA
GetShortPathNameW
ReleaseActCtx
DeleteFileW
GetCommandLineA
InterlockedIncrement
InterlockedExchange
CopyFileW
CreateActCtxW
FormatMessageW
GetModuleFileNameA
EnterCriticalSection
FindNextVolumeW
GetExitCodeThread
CreateNamedPipeW
GetUserDefaultLCID
GetConsoleAliasesLengthW
WriteProfileSectionA
AddAtomA
InterlockedDecrement
GetVersionExW
HeapSize
_hwrite
InterlockedCompareExchange
GetStartupInfoA
CreateMailslotA
GetCPInfoExW
GetSystemWow64DirectoryW
SetLastError
GetPrivateProfileIntW
GetConsoleAliasExesW
DebugBreak
EndUpdateResourceW
GetTickCount
VirtualQuery
OpenFileMappingA
GetModuleHandleW
GetDefaultCommConfigA
VirtualAlloc
TerminateProcess
GetACP
CreateIoCompletionPort
GetDiskFreeSpaceExA
DefineDosDeviceA
GetExitCodeProcess
EnumResourceTypesA
SetConsoleTextAttribute
EndUpdateResourceA
IsProcessInJob
MoveFileA
lstrcpynW
WriteConsoleA
GetProcAddress
lstrcatA
LoadLibraryW
ReadConsoleOutputA
GetStartupInfoW
FoldStringW
WritePrivateProfileStringW
SetHandleInformation
WritePrivateProfileStructA
DeleteCriticalSection
GetFileAttributesA
GetCurrentActCtx
CopyFileA
CancelDeviceWakeupRequest
ResetEvent
LockFile
MoveFileW
DisableThreadLibraryCalls
GetOverlappedResult
GetCommTimeouts
FormatMessageA
InterlockedExchangeAdd
GlobalAlloc
SetThreadPriorityBoost
SetFileShortNameA
GetFileAttributesW
SetCalendarInfoW
ConvertFiberToThread
SetComputerNameA
GetConsoleAliasesW
EnumDateFormatsA
SetTimeZoneInformation
SetConsoleOutputCP
MoveFileWithProgressW
GetStdHandle
GetLocalTime
FoldStringA
EnumSystemLocalesW
ActivateActCtx
CopyFileExA
CreateMemoryResourceNotification
OpenSemaphoreA
GetModuleHandleExA
AddAtomW
_hread
GetFileType
UnhandledExceptionFilter
GetConsoleAliasesLengthA
GetProcessShutdownParameters
lstrcpynA
GlobalUnWire
GetCompressedFileSizeA
ReadConsoleA
FreeUserPhysicalPages
WriteConsoleOutputCharacterW
TerminateJobObject
CreateFileA
SetTimerQueueTimer
SetUnhandledExceptionFilter
RaiseException
HeapValidate
IsBadReadPtr
LeaveCriticalSection
GetModuleFileNameW
IsDebuggerPresent
GetLastError
SetFilePointer
SetStdHandle
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
ExitProcess
SetHandleCount
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapReAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
FlushFileBuffers
GetConsoleOutputCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CloseHandle
ReadFile
user32
CharUpperA
Sections
.text Size: 234KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 174KB - Virtual size: 6.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jim Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.karah Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fogif Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.humunab Size: 512B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ