C:\puzilub27\puwezajipa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
765c420c53c1869422f65673512271bb2ebcc4f89ed0f161a37ff1475b909584.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
765c420c53c1869422f65673512271bb2ebcc4f89ed0f161a37ff1475b909584.exe
Resource
win10v2004-20241007-en
General
-
Target
765c420c53c1869422f65673512271bb2ebcc4f89ed0f161a37ff1475b909584
-
Size
280KB
-
MD5
22edfa0dfb309f7aa388f56b87fa43de
-
SHA1
69213755c95352839b420e4ecba3acee19a1cee3
-
SHA256
765c420c53c1869422f65673512271bb2ebcc4f89ed0f161a37ff1475b909584
-
SHA512
bcdd4d108c33e6dc45282ffd117e64f99e1a572dd8a5d2a5df2b98a061c08b3baaf7ac41641174bf8ccee90e142c7d072a70846ba6243344951e932239938613
-
SSDEEP
6144:lUozwBtMhPhj690IKYpnWwKM61x3yRScYhKiS/vEQ0:6ozI+JjVIKYpnWU6rj1SXEH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 765c420c53c1869422f65673512271bb2ebcc4f89ed0f161a37ff1475b909584
Files
-
765c420c53c1869422f65673512271bb2ebcc4f89ed0f161a37ff1475b909584.exe windows:5 windows x86 arch:x86
ac1684448cf7924ecf9ec7ac1082a925
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFullPathNameA
UnregisterWait
FindResourceA
lstrcmpA
WriteConsoleInputW
TryEnterCriticalSection
WriteConsoleOutputCharacterW
WritePrivateProfileStructA
GetConsoleAliasesLengthW
GetModuleHandleExA
SetComputerNameExA
MoveFileExA
lstrcpynA
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
LoadResource
UpdateResourceA
_lwrite
GetQueuedCompletionStatus
VerSetConditionMask
ReadConsoleA
InterlockedDecrement
ZombifyActCtx
WritePrivateProfileSectionA
SetDefaultCommConfigW
SetFirmwareEnvironmentVariableA
CreateJobObjectW
GetProfileSectionA
InterlockedCompareExchange
WriteConsoleInputA
SetComputerNameW
GetComputerNameW
FlushConsoleInputBuffer
ConnectNamedPipe
GetModuleHandleW
GetTickCount
CreateNamedPipeW
VirtualFree
GetConsoleAliasesLengthA
GetDllDirectoryW
GetPrivateProfileStringW
GetConsoleTitleA
GetCompressedFileSizeW
GetConsoleAliasExesW
GetDateFormatA
FindActCtxSectionStringA
GetUserDefaultLangID
GetCommandLineA
CreateActCtxW
EnumResourceTypesA
SetProcessPriorityBoost
GetDriveTypeA
GetPriorityClass
GetVolumePathNameW
GlobalAlloc
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
IsProcessInJob
CopyFileW
AssignProcessToJobObject
GetCalendarInfoW
ReadProcessMemory
GetSystemWow64DirectoryW
GetSystemWindowsDirectoryA
ReadConsoleOutputW
FormatMessageW
GetVersionExW
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
GetWriteWatch
SetConsoleCursorPosition
VerifyVersionInfoA
WriteConsoleW
GetBinaryTypeA
TerminateProcess
GetAtomNameW
GetMailslotInfo
GetTimeZoneInformation
CreateFileW
lstrcatA
GetOverlappedResult
GetACP
lstrlenW
FindNextVolumeMountPointW
SetThreadPriority
RaiseException
GetStringTypeExA
DeactivateActCtx
GetNamedPipeHandleStateW
GetPrivateProfileIntW
GetConsoleAliasesW
SetCurrentDirectoryA
GetStartupInfoA
FillConsoleOutputCharacterW
FreeLibraryAndExitThread
GetHandleInformation
GetLastError
ChangeTimerQueueTimer
GetLongPathNameW
ReadConsoleOutputCharacterA
DefineDosDeviceW
EnumDateFormatsExA
LocalLock
EnterCriticalSection
VerLanguageNameW
BuildCommDCBW
FindClose
ResetEvent
_hwrite
GetLocalTime
LoadLibraryA
InterlockedExchangeAdd
OpenWaitableTimerW
SetCalendarInfoW
GetFileType
WritePrivateProfileStringA
MoveFileA
SetConsoleOutputCP
GetExitCodeThread
AddAtomW
GetProfileStringA
WriteProfileSectionW
VirtualLock
GlobalGetAtomNameW
HeapLock
GetCommMask
HeapWalk
GetTapeParameters
FoldStringW
SetSystemTime
GlobalWire
GetModuleFileNameA
GetPrivateProfileSectionNamesA
FindNextFileA
EnumDateFormatsA
FindFirstChangeNotificationA
lstrcatW
FreeEnvironmentStringsW
EnumResourceNamesA
FindNextFileW
CreateMailslotA
GetStringTypeW
WriteProfileStringW
VirtualProtect
OutputDebugStringA
GetCPInfoExA
SetThreadAffinityMask
OpenSemaphoreW
GetDiskFreeSpaceExA
EndUpdateResourceA
GetVersionExA
GetVersion
FindFirstVolumeW
GetCurrentProcessId
MoveFileWithProgressW
GetFileInformationByHandle
DebugBreak
FindActCtxSectionStringW
OpenFileMappingA
SuspendThread
CopyFileExA
DeleteFileA
lstrcpyA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsDebuggerPresent
MultiByteToWideChar
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RtlUnwind
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
SetHandleCount
GetOEMCP
GetCPInfo
IsValidCodePage
OutputDebugStringW
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
FlushFileBuffers
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
GetStringTypeA
GetLocaleInfoA
LCMapStringA
LCMapStringW
CreateFileA
CloseHandle
ReadFile
Sections
.text Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 709KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wef Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nokizom Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.voteyi Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ