C:\rak91\hozufezoguv21.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b67202f4b9479500062d6775aa6b274720fec0d0684367d354749044bbbd737a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b67202f4b9479500062d6775aa6b274720fec0d0684367d354749044bbbd737a.exe
Resource
win10v2004-20241007-en
General
-
Target
b67202f4b9479500062d6775aa6b274720fec0d0684367d354749044bbbd737a
-
Size
127KB
-
MD5
b5d2d2f33611908ec6a9752f68bbd742
-
SHA1
30a8be5b5c59cb5de26677aebacea23d1aeb26d2
-
SHA256
b67202f4b9479500062d6775aa6b274720fec0d0684367d354749044bbbd737a
-
SHA512
41f7110aa7f8014e74044a3b1c00592f84145243cda32e59c1d4c5c1486173fdbceee6b7a396d0a372deb2707942871a5cecd693585d06a826e144a49742220b
-
SSDEEP
3072:Z4NCaM15/ZGUkgHsycZjCXWqfPbxKX73z:iNI5RGUDDcpbqflAv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b67202f4b9479500062d6775aa6b274720fec0d0684367d354749044bbbd737a
Files
-
b67202f4b9479500062d6775aa6b274720fec0d0684367d354749044bbbd737a.exe windows:5 windows x86 arch:x86
006a79ea8a61231651632116bf97f2d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
HeapReAlloc
GetLocaleInfoA
LoadResource
InterlockedDecrement
GetEnvironmentStringsW
AddConsoleAliasW
SetEvent
OpenSemaphoreA
GetSystemTimeAsFileTime
WriteFileGather
CreateActCtxW
GetEnvironmentStrings
LeaveCriticalSection
GetFileAttributesA
FindNextVolumeW
GetDevicePowerState
GetProcAddress
FreeUserPhysicalPages
VerLanguageNameW
WriteConsoleA
GetProcessId
LocalAlloc
RemoveDirectoryW
WaitForMultipleObjects
EnumResourceTypesW
GetModuleFileNameA
GetModuleHandleA
EraseTape
GetStringTypeW
ReleaseMutex
EndUpdateResourceA
LocalSize
FindFirstVolumeW
FindNextVolumeA
lstrcpyW
HeapAlloc
GetCommandLineA
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
SetHandleCount
GetFileType
GetLastError
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
CloseHandle
CreateFileA
user32
GetCursorPos
Exports
Exports
@SetViceVariants@12
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 533KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ