C:\zozugezopuxose94\xadejapix2\yefumijisaco\so.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f9ed745668a3a1b10b2531cb51d8d22f19250d09fa01bd36b5d8756cb8b8bc14.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9ed745668a3a1b10b2531cb51d8d22f19250d09fa01bd36b5d8756cb8b8bc14.exe
Resource
win10v2004-20241007-en
General
-
Target
a113b48bc313b07f1406581bae2f8a95912e9f43
-
Size
273KB
-
MD5
fccf945795c0244190667dfe07d21b61
-
SHA1
a113b48bc313b07f1406581bae2f8a95912e9f43
-
SHA256
e5a15478fb947e20f5288b664a2f3a7cbdac05aa5d48378b2976ac5b9b47cb6a
-
SHA512
7862346877dfc9ebd513471c1205e979f45b2338790751c931da9ba0f812d0408e0db202cd879e2b9d951df9f3183afbfdc78abccc34578e8865cafde74d9af9
-
SSDEEP
6144:6Wd/Qrp0CJCHMPGGUONpgIHNkXGJaMNXiJFgf82iAk30X:6WS5MHMTNbtQGU8iJFgfdiAkkX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f9ed745668a3a1b10b2531cb51d8d22f19250d09fa01bd36b5d8756cb8b8bc14
Files
-
a113b48bc313b07f1406581bae2f8a95912e9f43.zip
-
f9ed745668a3a1b10b2531cb51d8d22f19250d09fa01bd36b5d8756cb8b8bc14.exe windows:5 windows x86 arch:x86
5f3091d63efa69318303be878abe31f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringA
InterlockedDecrement
_hread
CancelWaitableTimer
WaitNamedPipeW
BuildCommDCBW
GetConsoleAliasExesLengthW
PeekConsoleInputA
CreateFileA
RegisterWaitForSingleObject
LoadLibraryA
EnumResourceTypesA
TransmitCommChar
GetFirmwareEnvironmentVariableW
GetModuleFileNameW
BeginUpdateResourceA
GetConsoleAliasExesLengthA
LoadLibraryW
DeleteFileW
FillConsoleOutputCharacterA
GetProcAddress
GetUserDefaultLCID
GetConsoleAliasW
FindFirstChangeNotificationA
RemoveDirectoryA
GetCalendarInfoW
FindFirstFileExW
AreFileApisANSI
GetCurrentDirectoryW
GetConsoleAliasesLengthW
SetConsoleTitleA
GetBinaryTypeA
GlobalAlloc
FindNextFileA
OpenJobObjectA
HeapFree
_lclose
GetComputerNameW
TlsSetValue
SetCalendarInfoW
SetComputerNameW
FoldStringW
GetDiskFreeSpaceW
GetSystemDefaultLangID
SetThreadLocale
WriteConsoleW
RtlUnwind
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
IsProcessorFeaturePresent
GetLastError
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
TerminateProcess
GetCurrentProcess
HeapAlloc
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RaiseException
LCMapStringW
GetStringTypeW
SetStdHandle
FlushFileBuffers
HeapReAlloc
SetEndOfFile
GetProcessHeap
ReadFile
HeapSize
CreateFileW
gdi32
GetCharWidth32A
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 178KB - Virtual size: 32.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ