C:\panalelefik\cekahuwoyasi\gihitu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9feb7797cf9359b5dc07204f3235422d5eaa54f950ee7c8f8066d1ce32c28914.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9feb7797cf9359b5dc07204f3235422d5eaa54f950ee7c8f8066d1ce32c28914.exe
Resource
win10v2004-20241007-en
General
-
Target
9feb7797cf9359b5dc07204f3235422d5eaa54f950ee7c8f8066d1ce32c28914
-
Size
306KB
-
MD5
eb2f262c358cbb360108f66e9ed72d5d
-
SHA1
ab4251243c069bfef568fa1b14446dcbb1824cf8
-
SHA256
9feb7797cf9359b5dc07204f3235422d5eaa54f950ee7c8f8066d1ce32c28914
-
SHA512
5ff86815b2f6225a6a8587c02b4eb7440c3174bfc29fded7a658833ac9a968e3a7d3f11455fc679e82258ef299020e0c2c01d15a5cbc6fba5dd4e830308f8d3b
-
SSDEEP
6144:+Z+M+oFVmcqiFTMi2VS4plo4LPD5pCzqn74yEoP:+ZJdIDiFqVS4p24Lqzmx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9feb7797cf9359b5dc07204f3235422d5eaa54f950ee7c8f8066d1ce32c28914
Files
-
9feb7797cf9359b5dc07204f3235422d5eaa54f950ee7c8f8066d1ce32c28914.exe windows:5 windows x86 arch:x86
0e837cd9eccfae6a38651c08666c9fa2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSize
lstrcmpA
WriteConsoleInputW
TryEnterCriticalSection
WritePrivateProfileStructA
GetConsoleAliasesLengthW
CopyFileExW
GetModuleHandleExA
GetConsoleAliasExesA
SetComputerNameExA
GetDriveTypeW
MoveFileExA
DebugActiveProcessStop
lstrcpynA
GetConsoleAliasExesLengthA
FindResourceW
BuildCommDCBAndTimeoutsA
LoadResource
UpdateResourceA
InterlockedIncrement
_lwrite
GetQueuedCompletionStatus
VerSetConditionMask
ReadConsoleA
InterlockedDecrement
ZombifyActCtx
SetDefaultCommConfigW
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
GetProfileSectionA
SetConsoleScreenBufferSize
InterlockedCompareExchange
WriteConsoleInputA
GetComputerNameW
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesLengthA
GetDllDirectoryW
GetPrivateProfileStringW
GetConsoleTitleA
ReadConsoleOutputA
GetDateFormatA
GetCommandLineA
CreateActCtxW
EnumResourceTypesA
SetProcessPriorityBoost
GetDriveTypeA
GetPriorityClass
GetVolumePathNameW
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
CopyFileW
AssignProcessToJobObject
GetCalendarInfoA
ReadProcessMemory
GetSystemWow64DirectoryW
SetSystemTimeAdjustment
GetSystemWindowsDirectoryA
FormatMessageW
GetVersionExW
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
GetWriteWatch
VerifyVersionInfoA
GetBinaryTypeA
WritePrivateProfileSectionW
TerminateProcess
GetAtomNameW
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
CreateFileW
GetOverlappedResult
GetACP
lstrlenW
FindNextVolumeMountPointW
CreateMailslotW
DisconnectNamedPipe
DeactivateActCtx
GetNamedPipeHandleStateW
GetConsoleAliasesW
ReleaseActCtx
SetCurrentDirectoryA
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetHandleInformation
GetLastError
GetLongPathNameW
ReadConsoleOutputCharacterA
CreateNamedPipeA
EnumDateFormatsExA
CreateTimerQueueTimer
WriteProfileSectionA
SetComputerNameA
VerLanguageNameW
GlobalGetAtomNameA
DefineDosDeviceA
ResetEvent
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
InterlockedExchangeAdd
SetCalendarInfoW
WritePrivateProfileStringA
MoveFileA
SetConsoleOutputCP
GetExitCodeThread
AddAtomW
GetProfileStringA
HeapLock
GetCommMask
HeapWalk
GetTapeParameters
FoldStringA
SetSystemTime
GlobalWire
GetPrivateProfileSectionNamesA
GetOEMCP
FindNextFileA
EnumDateFormatsA
CreateIoCompletionPort
FindFirstChangeNotificationA
lstrcatW
FreeEnvironmentStringsW
FindNextFileW
GetStringTypeW
BuildCommDCBA
VirtualProtect
OutputDebugStringA
SetThreadAffinityMask
EndUpdateResourceA
CloseHandle
GetVersion
DeleteFileW
GetCurrentProcessId
MoveFileWithProgressW
GetFileInformationByHandle
DebugBreak
FindActCtxSectionStringW
SuspendThread
lstrcpyA
SetUnhandledExceptionFilter
WideCharToMultiByte
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
Sleep
GetProcAddress
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
GetCurrentProcess
IsDebuggerPresent
GetModuleFileNameW
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
DeleteCriticalSection
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
SetStdHandle
GetConsoleOutputCP
FlushFileBuffers
CreateFileA
DeleteFileA
GetModuleHandleA
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 320KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ