C:\piveruzapikixi10\ruwapoh89.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f.exe
Resource
win10v2004-20241007-en
General
-
Target
fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f
-
Size
327KB
-
MD5
6d4f67848e786a5960ff5d4cd0a7b779
-
SHA1
43f915c59a332a77819ce4c66eaa0559ea5850c4
-
SHA256
fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f
-
SHA512
f731ea25fc5f486802df27e7599dac3d2348a4cd294c6a8a227d5f4c932be3266401dd0fe4c957cbd619d7b6ebd262791e1f870f6224b226374ecd7a14e62a03
-
SSDEEP
6144:uV2Wn+BJeujmW0XPMFGMDYu5UmLH+66IclZH28RMci77e+:uVCJeujzoMFGMDYu+mLH+6N+W8RFiPe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f
Files
-
fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f.exe windows:5 windows x86 arch:x86
1c3da129f45d5b8c92de99679bed96fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetNamedPipeHandleStateW
CreateNamedPipeA
CallNamedPipeA
TerminateThread
GetExitCodeProcess
GetVersionExW
VerifyVersionInfoW
SetConsoleCP
GetConsoleAliasesLengthA
VerLanguageNameW
FindFirstFileExA
VerifyVersionInfoA
FreeEnvironmentStringsA
GetProcessPriorityBoost
SetVolumeMountPointW
GetLongPathNameW
CopyFileA
TlsSetValue
SetConsoleCursorInfo
TzSpecificLocalTimeToSystemTime
SetProcessShutdownParameters
ReleaseMutex
BuildCommDCBAndTimeoutsA
GetProcAddress
LoadLibraryA
LocalAlloc
SleepEx
MoveFileA
GetCommandLineW
InterlockedDecrement
DeleteFileA
CreateActCtxA
SetFileAttributesA
GetPrivateProfileIntA
GetProcessHeap
ReadConsoleOutputCharacterA
GetStartupInfoA
GetDiskFreeSpaceExW
GetCPInfoExW
GetWindowsDirectoryA
GetSystemWow64DirectoryA
SetLastError
GetProfileStringA
GetCalendarInfoW
GetTickCount
GetStringTypeW
DebugBreak
FindFirstFileA
lstrcmpA
WriteFile
GetConsoleMode
WriteProfileStringW
lstrcatW
SetFirmwareEnvironmentVariableA
InterlockedExchange
SetCriticalSectionSpinCount
DefineDosDeviceW
WriteConsoleW
InterlockedIncrement
GetPrivateProfileSectionW
WritePrivateProfileSectionW
GetPrivateProfileStructA
TryEnterCriticalSection
GetPrivateProfileStructW
GetFileAttributesExW
HeapWalk
CreateIoCompletionPort
PeekConsoleInputA
GetNumberFormatW
FindResourceExW
SetLocalTime
GetQueuedCompletionStatus
CreateSemaphoreA
GetThreadLocale
SetFileShortNameW
lstrcpyW
ReplaceFileA
MoveFileExW
GetConsoleCP
GetVolumePathNameA
FlushConsoleInputBuffer
SearchPathA
FreeConsole
GetConsoleAliasExesLengthA
WriteConsoleInputA
LocalShrink
GetCommState
EnumSystemLocalesW
ProcessIdToSessionId
SetMessageWaitingIndicator
GetWriteWatch
RaiseException
OpenSemaphoreW
GetConsoleScreenBufferInfo
ClearCommError
TlsAlloc
GetSystemTimeAdjustment
OpenMutexA
GetComputerNameW
HeapValidate
GetLastError
OpenMutexW
WaitForMultipleObjectsEx
SignalObjectAndWait
SetSystemPowerState
VirtualLock
SetWaitableTimer
ChangeTimerQueueTimer
GetProcessHandleCount
FatalAppExitA
lstrcpynW
SetNamedPipeHandleState
FillConsoleOutputCharacterW
GetCompressedFileSizeW
FindNextVolumeMountPointA
GetFullPathNameA
WriteProfileStringA
GlobalAddAtomW
LeaveCriticalSection
SetCurrentDirectoryW
LockFile
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
EncodePointer
DecodePointer
IsBadReadPtr
RtlUnwind
GetModuleHandleW
ExitProcess
HeapSetInformation
GetStartupInfoW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapSize
HeapQueryInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
GetCurrentThreadId
TlsFree
GetStdHandle
LoadLibraryW
GetLocaleInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetLocaleInfoA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
OutputDebugStringA
OutputDebugStringW
SetFilePointer
SetStdHandle
CreateFileW
CloseHandle
FlushFileBuffers
Sections
.text Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 539KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.beza Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tetutit Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ