C:\xonafobozaxug-gonufuxir67 jigatiwat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4cb978b52d714df1a43945fd1da69ec2024cc9d7afc95052ac0dcd067d9cb233.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4cb978b52d714df1a43945fd1da69ec2024cc9d7afc95052ac0dcd067d9cb233.exe
Resource
win10v2004-20241007-en
General
-
Target
4cb978b52d714df1a43945fd1da69ec2024cc9d7afc95052ac0dcd067d9cb233
-
Size
410KB
-
MD5
bb53e1a36e4bb2dbb3008f7e575144e5
-
SHA1
dee7f1853dba23d8cfdfbfa4851f1bd2c0e8006a
-
SHA256
4cb978b52d714df1a43945fd1da69ec2024cc9d7afc95052ac0dcd067d9cb233
-
SHA512
89fd579e6f297be2f95867c80fb57cbfdafad6573cca724e78664b2dadd3fece3c2c622b1f5f52130a5c5e1a729da3f259b5772c4db59c0c708a1ee40c4fbbab
-
SSDEEP
6144:kMRBC/R6TE/iRAtvdnm4iYVC0dbflCZjmUdhTjMmhIkzHf0KRGGDkTB5wCuPG1:AW6tc4iGCyfIZjmFmikzHf0D0kTFiG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4cb978b52d714df1a43945fd1da69ec2024cc9d7afc95052ac0dcd067d9cb233
Files
-
4cb978b52d714df1a43945fd1da69ec2024cc9d7afc95052ac0dcd067d9cb233.exe windows:5 windows x86 arch:x86
2f9c37997e4f6c022f6907755dbb312e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstVolumeW
ExitProcess
GetExitCodeProcess
DeactivateActCtx
GetVersionExW
VerifyVersionInfoA
GetPrivateProfileStringW
GetConsoleCP
TlsGetValue
GetConsoleMode
CopyFileExW
VerLanguageNameW
FindFirstChangeNotificationW
FreeEnvironmentStringsW
RequestWakeupLatency
SetVolumeMountPointW
GetLongPathNameW
SetConsoleCursorInfo
GlobalHandle
SystemTimeToTzSpecificLocalTime
SetProcessShutdownParameters
CompareStringW
LocalLock
GetNamedPipeHandleStateW
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
LocalAlloc
Sleep
MoveFileExA
GetCommandLineW
InterlockedDecrement
InterlockedExchange
DeleteFileW
GetVolumePathNamesForVolumeNameA
GetPrivateProfileStringA
GetPrivateProfileIntW
HeapValidate
GetProcessHeaps
CreateNamedPipeW
GetCPInfoExA
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryA
GetCalendarInfoA
GetLastError
GetStringTypeA
FatalAppExitA
GetThreadSelectorEntry
WaitForDebugEvent
ReadFileScatter
GetTempPathW
GetDefaultCommConfigW
UnmapViewOfFile
GlobalWire
WritePrivateProfileSectionW
TerminateThread
lstrcatW
VirtualLock
CreateActCtxW
InterlockedPopEntrySList
OutputDebugStringW
SetConsoleTitleA
DefineDosDeviceW
LoadLibraryA
WritePrivateProfileStringW
WaitNamedPipeW
InterlockedIncrement
TerminateProcess
SetConsoleMode
PeekConsoleInputW
ReadConsoleOutputW
GetNumaProcessorNode
DuplicateHandle
GetPrivateProfileSectionNamesA
EnumTimeFormatsA
SetLocalTime
FindNextFileA
FindFirstFileW
CreateSemaphoreA
OutputDebugStringA
lstrcpyW
HeapSetInformation
CreateHardLinkA
SetThreadExecutionState
GetSystemTime
LockFile
EnumCalendarInfoExA
MoveFileExW
GetVolumePathNamesForVolumeNameW
SetConsoleScreenBufferSize
SearchPathA
GetOverlappedResult
IsBadStringPtrA
GetAtomNameW
GetConsoleAliasExesLengthA
WriteConsoleInputA
LocalUnlock
SetCommConfig
_lopen
EnumSystemLocalesA
GetCommState
SetEndOfFile
GetWriteWatch
UnhandledExceptionFilter
OpenSemaphoreA
GetConsoleScreenBufferInfo
EnumDateFormatsW
GetSystemTimeAdjustment
ZombifyActCtx
GetComputerNameA
HeapCompact
CommConfigDialogA
GetModuleFileNameA
OpenMutexA
AllocateUserPhysicalPages
FindResourceA
DeleteTimerQueueTimer
EnumResourceNamesA
CreateTimerQueueTimer
GetProcessTimes
UnregisterWait
IsBadWritePtr
GetCurrentProcessId
FatalAppExitW
GetFileAttributesA
lstrcpynW
SetNamedPipeHandleState
WriteConsoleOutputAttribute
GetCompressedFileSizeA
SetFileShortNameA
GetFullPathNameW
WriteProfileStringW
AddVectoredExceptionHandler
GlobalAddAtomA
EnumDateFormatsExW
TerminateJobObject
QueryDosDeviceA
LeaveCriticalSection
GetBinaryTypeA
SetCurrentDirectoryA
CloseHandle
CreateFileW
GetNumberFormatW
OpenFileMappingA
EncodePointer
DecodePointer
MoveFileA
GetStartupInfoW
IsBadReadPtr
GetModuleHandleW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
EnterCriticalSection
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
GetCurrentProcess
IsDebuggerPresent
HeapFree
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
LoadLibraryW
RtlUnwind
WriteConsoleW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
RaiseException
SetStdHandle
FlushFileBuffers
user32
GetCursorInfo
gdi32
GetBitmapBits
Sections
.text Size: 303KB - Virtual size: 303KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 561KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ