C:\babexoy61\wucojuy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7113fcbe8738d2d92296f50840de8b3349ec1b43da22010993df6299fe183144.exe
Resource
win7-20241023-en
General
-
Target
7113fcbe8738d2d92296f50840de8b3349ec1b43da22010993df6299fe183144
-
Size
359KB
-
MD5
e0e4cbccebb23c290228d5315e7c71ab
-
SHA1
aca374e225b40f697e7c7f0dce830fa7bbcf6803
-
SHA256
7113fcbe8738d2d92296f50840de8b3349ec1b43da22010993df6299fe183144
-
SHA512
c2ac0a293c766f9be87c4ef9fdd7c202e751d62dff002eebe2c9110ca278951c834b299490321fcf509ea62ac937d5543199636ba865c99043dea345d4e568ba
-
SSDEEP
6144:6yxacAmHHPqpY+k84Z93GjpmA0H5GsWnvsYb5n2zrYUJ6PF:6yxDAmHypoN38gAyg7vb5n2zEG6t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7113fcbe8738d2d92296f50840de8b3349ec1b43da22010993df6299fe183144
Files
-
7113fcbe8738d2d92296f50840de8b3349ec1b43da22010993df6299fe183144.exe windows:5 windows x86 arch:x86
f1417a80cdf5dd87dd4a77d1079e7f60
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
GetThreadContext
CopyFileExW
TlsGetValue
FindResourceExW
InterlockedIncrement
GetCommState
InterlockedDecrement
UnlockFile
SetEvent
FreeEnvironmentStringsA
CreateNamedPipeW
GetConsoleAliasesLengthA
GetPrivateProfileIntA
LoadLibraryW
GetConsoleAliasExesLengthW
HeapDestroy
CreateSemaphoreA
GetBinaryTypeA
TerminateProcess
GetSystemDirectoryA
lstrlenW
LCMapStringA
GetPrivateProfileIntW
InterlockedExchange
GetStartupInfoA
SetThreadLocale
GetStdHandle
GetCPInfoExW
FreeLibraryAndExitThread
GetLastError
GetCurrentDirectoryW
GetProcAddress
EnterCriticalSection
LoadLibraryA
OpenMutexA
LocalAlloc
WritePrivateProfileStringA
GetNumberFormatW
GetProfileStringA
SetThreadIdealProcessor
HeapWalk
FindAtomA
SetSystemTime
GlobalWire
GetModuleFileNameA
CreateIoCompletionPort
GetModuleHandleA
FindFirstChangeNotificationA
FindNextFileW
WriteProfileStringW
SetFileShortNameA
EnumResourceLanguagesW
UnregisterWaitEx
GetSystemTime
CopyFileExA
DeleteFileA
GetVolumeInformationW
LocalFileTimeToFileTime
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
HeapValidate
IsBadReadPtr
GetModuleHandleW
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
SetFilePointer
GetConsoleCP
GetConsoleMode
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
RtlUnwind
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
HeapFree
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
MultiByteToWideChar
IsProcessorFeaturePresent
FlushFileBuffers
SetStdHandle
LCMapStringW
GetStringTypeW
CloseHandle
CreateFileW
RaiseException
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ