C:\bogexurupog60\witeyipulamac24 tokibel.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b5cf5f35bf7ea527aab286cf4f24afc32d7d874b2ee752908bbc7d34bf049d93.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b5cf5f35bf7ea527aab286cf4f24afc32d7d874b2ee752908bbc7d34bf049d93.exe
Resource
win10v2004-20241007-en
General
-
Target
044ae6880c387cfb07a131fd30ddab0afc94f381eb98289a88501766c4fa24e8
-
Size
155KB
-
MD5
3ff3eef91269280607353df6e28f825d
-
SHA1
4f15559ea2113cf92362e70926ee4885c06c6d43
-
SHA256
044ae6880c387cfb07a131fd30ddab0afc94f381eb98289a88501766c4fa24e8
-
SHA512
e0efa363edbbec715da3095cba53968d575fc1cda5bd8385b1039a7b33580d465a7b16a99bfddb4e082d03a44b258052f196762783134faf854f20b4f1165ad3
-
SSDEEP
3072:qGThxwaJTZ8cKnD+5FDLHb5ORN2pJQs41f4VpKRCOvki5q:xhhI6fb4v2pJQR1fgp/Skgq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/b5cf5f35bf7ea527aab286cf4f24afc32d7d874b2ee752908bbc7d34bf049d93
Files
-
044ae6880c387cfb07a131fd30ddab0afc94f381eb98289a88501766c4fa24e8.zip
-
b5cf5f35bf7ea527aab286cf4f24afc32d7d874b2ee752908bbc7d34bf049d93.exe windows:5 windows x86 arch:x86
89e7552a7bf49c6b2882e1ebfa72cd34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
lstrlenA
GetStringTypeA
WaitNamedPipeA
SetComputerNameW
CreateHardLinkA
GetFileAttributesExA
GetModuleHandleW
GetTickCount
SetCommState
GetVolumePathNameW
GetPrivateProfileIntA
LoadLibraryW
GetFileAttributesA
GetFileAttributesW
WriteConsoleW
GetConsoleAliasesW
SetProcessAffinityMask
GetProcAddress
VirtualAlloc
CopyFileA
LoadLibraryA
GetProcessWorkingSetSize
LocalAlloc
OpenJobObjectW
GetModuleHandleA
CreateMutexA
FindNextFileW
AddConsoleAliasA
GlobalReAlloc
SetFileAttributesW
LCMapStringW
GetLastError
GetSystemDefaultLangID
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
CreateFileA
LCMapStringA
MultiByteToWideChar
GetStringTypeW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
SetEndOfFile
GetProcessHeap
ReadFile
RaiseException
advapi32
BackupEventLogW
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ