C:\giwacexo_kojigoyuputas\90\bepibaxehik-yekug.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7d2d25aff7430a0c9d7f49f4ae051ec6e4c1a0f7f8154f8e7b6f267189c7358c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d2d25aff7430a0c9d7f49f4ae051ec6e4c1a0f7f8154f8e7b6f267189c7358c.exe
Resource
win10v2004-20241007-en
General
-
Target
7d2d25aff7430a0c9d7f49f4ae051ec6e4c1a0f7f8154f8e7b6f267189c7358c
-
Size
291KB
-
MD5
53df2620eca55c7da3436b729be855c4
-
SHA1
80c86374ff3c13f30b4378b031a6e0e3b9103f3a
-
SHA256
7d2d25aff7430a0c9d7f49f4ae051ec6e4c1a0f7f8154f8e7b6f267189c7358c
-
SHA512
24c3042a515d92bc9507fa745980e7abb8bb8078dc9ec1d1015230f84163bcc8e19594873a005f450bf30416993663278839717f43ec944b84caf4d495d9b106
-
SSDEEP
6144:cQAR5/CqnaIQFOarWxzV6lVKxODpRKIki:cvRRaIQF7+zV6lVKxODJT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7d2d25aff7430a0c9d7f49f4ae051ec6e4c1a0f7f8154f8e7b6f267189c7358c
Files
-
7d2d25aff7430a0c9d7f49f4ae051ec6e4c1a0f7f8154f8e7b6f267189c7358c.exe windows:5 windows x86 arch:x86
ba8fb4919796ba15ef3c17ab1a11e5fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TlsGetValue
GetCPInfo
ReadConsoleA
InterlockedDecrement
GetSystemWindowsDirectoryW
HeapFree
SetHandleInformation
GetProfileSectionA
SetVolumeMountPointW
UnlockFile
BackupSeek
FreeEnvironmentStringsA
GetModuleHandleW
IsBadReadPtr
GetConsoleAliasesLengthA
GetPrivateProfileStringW
GetDriveTypeA
ActivateActCtx
GlobalAlloc
GetPrivateProfileIntA
GetSystemWow64DirectoryW
GetVersionExW
SetDllDirectoryA
SetConsoleMode
SetConsoleCursorPosition
VerifyVersionInfoA
IsDBCSLeadByte
GetSystemDirectoryA
CreateActCtxA
CompareStringW
GetStartupInfoW
WritePrivateProfileStringW
GetNamedPipeHandleStateW
FindFirstFileExA
GetLastError
SetLastError
GetProcAddress
WriteProfileSectionA
GlobalGetAtomNameA
BuildCommDCBW
OpenWaitableTimerW
SetFileApisToANSI
QueryDosDeviceW
SetSystemTime
SetEnvironmentVariableA
GetModuleFileNameA
SetConsoleCursorInfo
FindFirstChangeNotificationA
GetCurrentDirectoryA
CompareStringA
GetFileTime
SetProcessShutdownParameters
SetFileShortNameA
ReadConsoleInputW
GetWindowsDirectoryW
DeleteFileW
LocalFileTimeToFileTime
CloseHandle
SetStdHandle
FlushFileBuffers
LCMapStringW
MoveFileA
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedIncrement
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapValidate
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
WriteFile
RaiseException
RtlUnwind
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
LoadLibraryW
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
GetStringTypeW
MultiByteToWideChar
CreateFileW
user32
GetCursorInfo
GetMessagePos
winhttp
WinHttpCloseHandle
Sections
.text Size: 242KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kejisi Size: 1024B - Virtual size: 741B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ