C:\few\gihecuk\wukudo\siwofekebo56\lidusipo-cirivu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
55a6d4ffb9429be6dcff4cf032b7b007a9931e714aa7eacdc12cea2f44a27ee6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55a6d4ffb9429be6dcff4cf032b7b007a9931e714aa7eacdc12cea2f44a27ee6.exe
Resource
win10v2004-20241007-en
General
-
Target
55a6d4ffb9429be6dcff4cf032b7b007a9931e714aa7eacdc12cea2f44a27ee6
-
Size
333KB
-
MD5
1e2f08bc7d3863e235ce07d51e70117f
-
SHA1
98df8d054b21d2170147052bb118c36464fa0e01
-
SHA256
55a6d4ffb9429be6dcff4cf032b7b007a9931e714aa7eacdc12cea2f44a27ee6
-
SHA512
7f92be98482e3c0ceb47b1b6a90475988bdb6ccc3c3505cbe538db920a493c60a1ed644900b735dcc4b2fdb3cf53249b01557230f27309d5c658871a476ebbc8
-
SSDEEP
3072:BcY0hyKQX8OhRyAr0uFUZ7gz2LFoclo9dwMIWLL7DUzFlwLOqbggtISSz6DUUSMJ:BXfRc0URA2LKcG0MbLT+FlSO8xI3Ei
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 55a6d4ffb9429be6dcff4cf032b7b007a9931e714aa7eacdc12cea2f44a27ee6
Files
-
55a6d4ffb9429be6dcff4cf032b7b007a9931e714aa7eacdc12cea2f44a27ee6.exe windows:5 windows x86 arch:x86
4dbb8565a3af7ad0eaed683cddb0f9e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TerminateProcess
GetExitCodeProcess
GetVersionExA
VerifyVersionInfoA
CopyFileExW
GetConsoleMode
GetConsoleCP
VerLanguageNameA
GetDriveTypeW
FindFirstChangeNotificationW
FreeEnvironmentStringsW
RequestWakeupLatency
SetVolumeMountPointA
GetLongPathNameW
CopyFileW
TlsGetValue
SetConsoleCursorInfo
LocalHandle
SystemTimeToTzSpecificLocalTime
SetProcessShutdownParameters
MultiByteToWideChar
LocalUnlock
GetNamedPipeHandleStateW
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleA
GlobalAlloc
Sleep
MoveFileA
GetCommandLineW
InterlockedDecrement
DeleteFileW
GetVolumePathNamesForVolumeNameA
GetPrivateProfileStringW
GetPrivateProfileIntA
HeapSize
GetProcessHeaps
CreateNamedPipeA
GetEnvironmentVariableA
GetCPInfoExA
GetSystemWindowsDirectoryA
GetSystemWow64DirectoryA
WriteProfileSectionW
GetCalendarInfoA
GetLastError
GetExitCodeThread
WaitForDebugEvent
ReadFileScatter
ReadFile
GetDefaultCommConfigA
GetNumberOfConsoleMouseButtons
GlobalWire
WritePrivateProfileSectionW
TerminateThread
WriteProfileStringA
lstrcatW
FindCloseChangeNotification
CreateActCtxA
InterlockedPopEntrySList
OutputDebugStringW
InterlockedExchange
SetConsoleTitleW
DefineDosDeviceW
LoadLibraryW
WritePrivateProfileStringW
WaitNamedPipeW
InterlockedIncrement
GetPrivateProfileStringA
SetConsoleMode
PeekConsoleInputA
GetNumberFormatA
FindFirstVolumeW
LoadModule
GetPrivateProfileSectionNamesW
EnumTimeFormatsA
SetLocalTime
CreateSemaphoreA
FindNextFileA
FindFirstFileW
FreeEnvironmentStringsA
OutputDebugStringA
lstrcpyW
HeapSetInformation
CreateHardLinkW
SetThreadExecutionState
GetSystemTime
LockFile
EnumCalendarInfoExA
MoveFileExA
SetConsoleScreenBufferSize
SearchPathW
IsBadStringPtrW
GetAtomNameW
GetConsoleAliasExesLengthA
WriteConsoleInputA
LocalLock
SetCommConfig
_lopen
EnumSystemLocalesA
GetNumaHighestNodeNumber
SetEndOfFile
GetWriteWatch
UnhandledExceptionFilter
OpenSemaphoreA
GetLargestConsoleWindowSize
GetProfileStringA
ZombifyActCtx
GetVolumePathNamesForVolumeNameW
SetSystemTimeAdjustment
GetComputerNameA
HeapCompact
CommConfigDialogA
OpenMutexA
GetStringTypeA
SetSystemPowerState
FindResourceA
DeleteTimerQueueTimer
EnumResourceNamesW
CreateTimerQueueTimer
GetProcessTimes
UnregisterWait
IsBadWritePtr
GetCurrentProcessId
FatalAppExitW
GetFileAttributesW
lstrcpynW
DisconnectNamedPipe
WriteConsoleOutputAttribute
GetCompressedFileSizeA
SetFileShortNameA
GetFullPathNameW
WriteProfileStringW
SetInformationJobObject
GlobalAddAtomA
TerminateJobObject
QueryDosDeviceW
LeaveCriticalSection
SetCurrentDirectoryA
EnumDateFormatsW
GetBinaryTypeW
CloseHandle
CreateSemaphoreW
OpenFileMappingA
EncodePointer
DecodePointer
GetStartupInfoW
IsProcessorFeaturePresent
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
SetLastError
ExitProcess
HeapValidate
IsBadReadPtr
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetEnvironmentStringsW
HeapCreate
WriteFile
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RaiseException
RtlUnwind
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapQueryInformation
HeapFree
SetFilePointer
WideCharToMultiByte
WriteConsoleW
LCMapStringW
GetStringTypeW
FlushFileBuffers
SetStdHandle
CreateFileW
user32
GetMenuItemID
GetCursorInfo
gdi32
GetBitmapBits
Sections
.text Size: 230KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 562KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ