C:\jibazuzivalus55 tedob.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8798198d1fecbd6846d4bec4cf4dab03717b3ad7895a99c4bf7b4bb713e55819.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8798198d1fecbd6846d4bec4cf4dab03717b3ad7895a99c4bf7b4bb713e55819.exe
Resource
win10v2004-20241007-en
General
-
Target
8798198d1fecbd6846d4bec4cf4dab03717b3ad7895a99c4bf7b4bb713e55819
-
Size
410KB
-
MD5
6f7f9963ede9907a9f1b88a02e4f429b
-
SHA1
92397fd1f4fe7a2dbeecba6b1cbc13384190136b
-
SHA256
8798198d1fecbd6846d4bec4cf4dab03717b3ad7895a99c4bf7b4bb713e55819
-
SHA512
038f3d2f4e7c1bb3f3fe042bbe7eb5184e165ebe305d8f20109fbc45c5425301fab83c23621dad2effe30395639090677a4694d7a073447112aefc8602f8704b
-
SSDEEP
6144:xe7JNLtZXhjwNjndQBvVDFcK5ykXWxpyk11EcQx06SnBz:oJNLFwhd4VDFrykXWxpyKEcQx07B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8798198d1fecbd6846d4bec4cf4dab03717b3ad7895a99c4bf7b4bb713e55819
Files
-
8798198d1fecbd6846d4bec4cf4dab03717b3ad7895a99c4bf7b4bb713e55819.exe windows:5 windows x86 arch:x86
cd2e8aca313b88a16bc7b305a3f26143
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenFileMappingA
FindFirstVolumeW
TerminateProcess
FatalExit
GetVersionExA
CopyFileExA
GetConsoleCP
VerifyVersionInfoA
VerLanguageNameW
GetDriveTypeW
FindFirstChangeNotificationA
FreeEnvironmentStringsW
GetProcessPriorityBoost
SetVolumeMountPointA
GetLongPathNameA
CopyFileW
TlsGetValue
VerifyVersionInfoW
GetConsoleCursorInfo
SystemTimeToTzSpecificLocalTime
GetProcessShutdownParameters
MultiByteToWideChar
GetNamedPipeHandleStateA
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
GlobalAlloc
Sleep
MoveFileW
GetCommandLineA
InterlockedDecrement
DeleteFileW
GetVolumePathNamesForVolumeNameW
GetPrivateProfileStringA
GetPrivateProfileIntA
HeapSize
GetProcessHeap
CreateNamedPipeA
SetFileShortNameW
GetStartupInfoW
GetEnvironmentVariableA
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryA
GetLastError
WriteProfileSectionW
GetCalendarInfoW
SetLastError
GetExitCodeThread
DebugBreak
FindFirstFileA
ReadFileScatter
ReadFile
SetDefaultCommConfigA
GetNumberOfConsoleMouseButtons
GlobalWire
WritePrivateProfileSectionA
WriteProfileStringA
lstrcatW
FindCloseChangeNotification
CreateActCtxW
InterlockedPopEntrySList
InterlockedExchange
SetConsoleTitleW
DefineDosDeviceW
LoadLibraryA
WritePrivateProfileStringA
WaitNamedPipeW
GetConsoleMode
HeapSetInformation
UnregisterWait
PeekConsoleInputA
GetNumberFormatA
DeleteFileA
LoadModule
GetPrivateProfileSectionNamesW
FindResourceExA
EnumTimeFormatsA
SetLocalTime
FindNextFileA
FindFirstFileW
FreeEnvironmentStringsA
CreateSemaphoreW
OutputDebugStringW
SetFileShortNameA
lstrcpyW
HeapWalk
CreateHardLinkW
RaiseException
GetSystemTime
UnlockFile
EnumCalendarInfoExA
MoveFileExA
SetConsoleScreenBufferSize
SearchPathW
IsBadStringPtrW
GetAtomNameA
GetConsoleAliasExesLengthA
WriteConsoleInputW
LocalLock
SetCommState
EnumSystemLocalesA
GetNumaHighestNodeNumber
SetEndOfFile
ResetWriteWatch
SetUnhandledExceptionFilter
OpenSemaphoreW
GetLargestConsoleWindowSize
GetProfileStringW
ReleaseActCtx
EnumDateFormatsW
SetSystemTimeAdjustment
OpenMutexW
GetComputerNameA
HeapValidate
CommConfigDialogA
OpenMutexA
GetStringTypeA
SetSystemPowerState
FindResourceW
SetTimerQueueTimer
EnumResourceNamesW
GetProcessTimes
RegisterWaitForSingleObject
IsBadReadPtr
GetCurrentProcessId
FatalAppExitW
GetFileAttributesW
lstrcpynW
DisconnectNamedPipe
FillConsoleOutputCharacterA
GetCompressedFileSizeA
GetFullPathNameA
WriteProfileStringW
SetInformationJobObject
GlobalAddAtomA
EnumDateFormatsA
TerminateJobObject
QueryDosDeviceA
LeaveCriticalSection
SetCurrentDirectoryA
CreateTimerQueueTimer
GetBinaryTypeA
CloseHandle
CreateFileW
SetStdHandle
EncodePointer
DecodePointer
GetCommandLineW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
InterlockedIncrement
IsProcessorFeaturePresent
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
ExitProcess
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
WriteFile
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
LoadLibraryW
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapQueryInformation
HeapFree
WideCharToMultiByte
LCMapStringW
GetStringTypeW
OutputDebugStringA
WriteConsoleW
SetFilePointer
FlushFileBuffers
user32
GetMenuItemID
GetCursorInfo
Sections
.text Size: 301KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 561KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ