C:\denux.pdb
Static task
static1
Behavioral task
behavioral1
Sample
80abcd4e17ae1a463b8825b5fb086e8baf795689.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
80abcd4e17ae1a463b8825b5fb086e8baf795689.exe
Resource
win10v2004-20241007-en
General
-
Target
80abcd4e17ae1a463b8825b5fb086e8baf795689
-
Size
400KB
-
MD5
e8997f9b19e19bbde83044487ce63b6a
-
SHA1
80abcd4e17ae1a463b8825b5fb086e8baf795689
-
SHA256
2f91555fcedbeb352e35cc8f09485e4cd3370c291b08320cf2a8abb12970ca99
-
SHA512
ee5415f5b020451926872c498b36a18d2897520e4b9ff737b941fd88f7b1273217c31a37583d262aff0d327bf6f2dcae432efd4dd0159a92f86ea1868d3c6b70
-
SSDEEP
12288:rD7lOFmSzMFxmJhhMWa+EiVgVl3hdNnzvPvJ:X7CuFahGWa+VqRzPv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 80abcd4e17ae1a463b8825b5fb086e8baf795689
Files
-
80abcd4e17ae1a463b8825b5fb086e8baf795689.exe windows:5 windows x86 arch:x86
f7252dd48caccbbc5da09bec4657c48c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileSize
FindResourceA
lstrcmpA
WriteConsoleInputW
TryEnterCriticalSection
WriteConsoleOutputCharacterW
WritePrivateProfileStructA
GetConsoleAliasesLengthW
CopyFileExW
GetModuleHandleExA
SetComputerNameExA
GetDriveTypeW
lstrcpynA
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
LoadResource
UpdateResourceA
_lwrite
GetQueuedCompletionStatus
VerSetConditionMask
MoveFileExW
ReadConsoleA
InterlockedDecrement
ZombifyActCtx
WritePrivateProfileSectionA
SetDefaultCommConfigW
GetNamedPipeHandleStateA
GetProfileSectionA
SetConsoleScreenBufferSize
InterlockedCompareExchange
WriteConsoleInputA
GetComputerNameW
ConnectNamedPipe
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesLengthA
GetDllDirectoryW
GetPrivateProfileStringW
GetConsoleTitleA
GetConsoleAliasExesW
GetDateFormatA
FindActCtxSectionStringA
GetCommandLineA
CreateActCtxW
EnumResourceTypesA
SetProcessPriorityBoost
GetPriorityClass
GetVolumePathNameW
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
IsProcessInJob
CopyFileW
AssignProcessToJobObject
GetCalendarInfoW
ReadProcessMemory
GetSystemWow64DirectoryW
GetSystemWindowsDirectoryA
ReadConsoleOutputW
FormatMessageW
GetSystemTimeAdjustment
GetVersionExW
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
GetWriteWatch
VerifyVersionInfoA
WriteConsoleW
GetBinaryTypeA
TerminateProcess
GetAtomNameW
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
CreateFileW
lstrcatA
GetOverlappedResult
GetACP
lstrlenW
FindNextVolumeMountPointW
CreateMailslotW
RaiseException
GetStringTypeExA
DeactivateActCtx
GetNamedPipeHandleStateW
GetConsoleAliasesW
ReleaseActCtx
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetHandleInformation
GetLastError
ChangeTimerQueueTimer
GetLongPathNameW
ReadConsoleOutputCharacterA
CreateNamedPipeA
EnumDateFormatsExA
SetComputerNameA
VerLanguageNameW
GlobalGetAtomNameA
BuildCommDCBW
DefineDosDeviceA
ResetEvent
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
InterlockedExchangeAdd
SetCalendarInfoW
WritePrivateProfileStringA
MoveFileA
SetConsoleOutputCP
GetExitCodeThread
AddAtomW
SetCurrentDirectoryW
GetProfileStringA
WriteProfileSectionW
VirtualLock
HeapLock
GetCommMask
HeapWalk
GetTapeParameters
FoldStringW
SetSystemTime
GlobalWire
GetModuleFileNameA
GetPrivateProfileSectionNamesA
FindNextFileA
EnumDateFormatsA
FindFirstChangeNotificationA
lstrcatW
FreeEnvironmentStringsW
FindNextFileW
GetStringTypeW
VirtualProtect
OutputDebugStringA
SetThreadAffinityMask
OpenSemaphoreW
EndUpdateResourceA
GetVersionExA
GetVersion
DeleteFileW
GetCurrentProcessId
DeleteAtom
MoveFileWithProgressW
GetFileInformationByHandle
DebugBreak
FindActCtxSectionStringW
SuspendThread
lstrcpyA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteFileA
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RtlUnwind
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetStdHandle
WriteFile
GetFileType
OutputDebugStringW
ExitProcess
SetHandleCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetFilePointer
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
CloseHandle
CreateFileA
Sections
.text Size: 178KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 178KB - Virtual size: 433KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.guz Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jube Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.doju Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ