C:\yarogulilonu8\moxoxohise-seh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5863b210e42078056e4d529637a76a280196c54a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5863b210e42078056e4d529637a76a280196c54a.exe
Resource
win10v2004-20241007-en
General
-
Target
5863b210e42078056e4d529637a76a280196c54a
-
Size
278KB
-
MD5
b5e914049ad58f7c317a4d1416a51a76
-
SHA1
5863b210e42078056e4d529637a76a280196c54a
-
SHA256
c62ed22a952a74a9777a81c4fccec2c035fad10eabda7b0e49f5424f36cbb005
-
SHA512
5f0534b82dfec7c1353deda030ffb7eb13b5b3dcf117c9475b29aaf25b8cda4468ecb953790740f39f097218af79184fb8d3a92bd323c4f3807340bc41f293ab
-
SSDEEP
6144:Uox4xtJeI0cVC1ZBRscLl07MRjhbZeBVhQdB:lyxtt0YGZBRscLX1dZeTO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5863b210e42078056e4d529637a76a280196c54a
Files
-
5863b210e42078056e4d529637a76a280196c54a.exe windows:5 windows x86 arch:x86
45df2cef5b0714811a3c68dc3e133c6c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindNextVolumeA
EnterCriticalSection
GetNamedPipeHandleStateW
CreateIoCompletionPort
FillConsoleOutputCharacterA
SetThreadAffinityMask
TerminateProcess
GetCurrentProcessId
GetVersionExA
EnumDateFormatsExW
FindNextFileW
CopyFileExA
BuildCommDCBAndTimeoutsW
DebugSetProcessKillOnExit
WriteProfileStringW
WritePrivateProfileStructA
FindFirstChangeNotificationA
MapViewOfFileEx
CreateTimerQueue
FindNextVolumeMountPointA
SetVolumeMountPointW
GetWriteWatch
ReadConsoleInputA
SetComputerNameExA
SystemTimeToTzSpecificLocalTime
GetSystemDirectoryA
GetDriveTypeA
BuildCommDCBAndTimeoutsA
LoadLibraryA
GlobalAlloc
VerifyVersionInfoW
GetBinaryTypeA
InterlockedExchange
InterlockedDecrement
FormatMessageW
SetDllDirectoryA
GetNamedPipeHandleStateA
WritePrivateProfileStringA
GetConsoleAliasesLengthW
GetProcessHeap
OpenWaitableTimerA
UnlockFile
InterlockedIncrement
GetStartupInfoW
GetSystemWow64DirectoryW
SetLastError
GetConsoleAliasExesW
ContinueDebugEvent
EndUpdateResourceA
GetLastError
FlushConsoleInputBuffer
SetDefaultCommConfigW
VirtualFree
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryA
CopyFileA
TerminateThread
GetOEMCP
FindAtomA
HeapUnlock
GetMailslotInfo
CreateActCtxA
GetConsoleAliasW
_lwrite
CreateNamedPipeA
SetSystemTimeAdjustment
DefineDosDeviceW
GetAtomNameA
SetConsoleScreenBufferSize
EnumResourceTypesA
lstrlenA
LoadLibraryW
WriteConsoleA
VirtualProtect
lstrcpyA
GetModuleHandleW
ReadConsoleOutputW
GetThreadContext
BuildCommDCBA
AddRefActCtx
GetStringTypeA
WritePrivateProfileStringW
GetDriveTypeW
GetFileAttributesW
OpenWaitableTimerW
GetVolumePathNameW
MoveFileW
GetCommMask
CloseHandle
LockFile
EnumDateFormatsExA
FindActCtxSectionStringA
GetNamedPipeInfo
AttachConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasesW
WriteConsoleInputW
CreateMailslotA
SetLocalTime
GetStringTypeExA
EnumSystemLocalesA
CallNamedPipeA
FindActCtxSectionStringW
GetPrivateProfileIntW
GetModuleHandleExW
GetConsoleAliasExesLengthW
GetTickCount
GetConsoleAliasesLengthA
GlobalWire
FillConsoleOutputCharacterW
GetCompressedFileSizeW
SetThreadPriority
MapUserPhysicalPages
WriteConsoleOutputCharacterA
EnumDateFormatsA
TerminateJobObject
CreateFileW
GetDateFormatA
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
DebugBreak
GetStdHandle
WriteFile
OutputDebugStringA
WriteConsoleW
GetFileType
OutputDebugStringW
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetStdHandle
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
CreateFileA
user32
GetCaretBlinkTime
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 319KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ