C:\yuy\xavuf-22\juhonisiziruki94 fexehujofo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
36df1edf1dcdf2f1648c9f90ddaf0da37aa8fa79df5ed2ed6c9bcb4c914c914b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
36df1edf1dcdf2f1648c9f90ddaf0da37aa8fa79df5ed2ed6c9bcb4c914c914b.exe
Resource
win10v2004-20241007-en
General
-
Target
36df1edf1dcdf2f1648c9f90ddaf0da37aa8fa79df5ed2ed6c9bcb4c914c914b
-
Size
293KB
-
MD5
5db62bb05fbbf523c00ee501ab922dd9
-
SHA1
f944ee8c6ab38d144e65648c480cb09e9bb8d8b0
-
SHA256
36df1edf1dcdf2f1648c9f90ddaf0da37aa8fa79df5ed2ed6c9bcb4c914c914b
-
SHA512
7d7b0da1ed86d137ef9c2aaf6bc548538571d144339bd48bd9ae64f4fa715e51961b2d28e91774bbc59d05a9903dfcafb152b82f6b83737e0b083270afc18518
-
SSDEEP
6144:JL0WbINz35Zf9eCHBlO8gzx/PAqqVZ1KjEnL6nYen8g9uzbgwu:JQWb8fAgXO8IPAq+ZQj+6YeP9unn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36df1edf1dcdf2f1648c9f90ddaf0da37aa8fa79df5ed2ed6c9bcb4c914c914b
Files
-
36df1edf1dcdf2f1648c9f90ddaf0da37aa8fa79df5ed2ed6c9bcb4c914c914b.exe windows:5 windows x86 arch:x86
594aca90413b48c89195867843c2ace7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLocaleInfoA
GetStringTypeA
ConvertThreadToFiber
GlobalAddAtomA
ZombifyActCtx
SetDefaultCommConfigW
GetEnvironmentStringsW
WaitForSingleObject
SetVolumeMountPointW
GetConsoleAliasesA
TerminateThread
GetProcessHandleCount
GetVersionExW
WriteConsoleInputW
WriteConsoleW
TerminateProcess
ReplaceFileW
FileTimeToSystemTime
SetComputerNameExW
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
HeapSize
LocalAlloc
GetModuleHandleA
ResetWriteWatch
EnumCalendarInfoExA
GetConsoleAliasW
HeapReAlloc
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LoadLibraryA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeW
advapi32
AreAllAccessesGranted
Sections
.text Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tapabo Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ