C:\pud\fexunaju.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4ac36ef3ea57b947d23b568d74c11b5dc08d81913c97226c08732a8b5b2126a1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4ac36ef3ea57b947d23b568d74c11b5dc08d81913c97226c08732a8b5b2126a1.exe
Resource
win10v2004-20241007-en
General
-
Target
d4a61fb56cb093ed2da218be0fb393ab
-
Size
299KB
-
MD5
d4a61fb56cb093ed2da218be0fb393ab
-
SHA1
344eb614ee4ea76df6b9d0d2ddf09c6450a0c9b6
-
SHA256
b64b644dca760e6a8d16e15bd8e68df98024687999bef72812b0da7cad640b57
-
SHA512
cc412e795f9ffb54014962374531adae0365a6a557464edf799269879ba4436668e84fc58ef45248de620928d5e83ae31b642f9e4f50e05bb8366a091a35b5ce
-
SSDEEP
6144:/b+3sP6gpmmoaHuttVfWnFoOHQnHBZJrYEZFZjLhEER2yub+peLtkO9NRcKTTsvo:/bks7yH4FYnHBZJrYE/ZBtR2+OH+K3sA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/4ac36ef3ea57b947d23b568d74c11b5dc08d81913c97226c08732a8b5b2126a1
Files
-
d4a61fb56cb093ed2da218be0fb393ab.zip
-
4ac36ef3ea57b947d23b568d74c11b5dc08d81913c97226c08732a8b5b2126a1.exe windows:5 windows x86 arch:x86
39faf729f370bc5b0eaea34fff27cff9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryA
WriteProfileSectionW
GetNumaProcessorNode
FindFirstVolumeW
SetConsoleCursorInfo
HeapLock
FindFirstChangeNotificationA
WaitForSingleObject
GetNamedPipeHandleStateA
FileTimeToDosDateTime
CallNamedPipeW
EnumResourceTypesW
EnumResourceNamesW
ExitProcess
GetExitCodeProcess
ActivateActCtx
GetVersionExA
VerifyVersionInfoW
GetConsoleOutputCP
ResetEvent
FindNextFileA
GetCompressedFileSizeW
CopyFileExW
ReadConsoleOutputCharacterA
GetDefaultCommConfigW
VerLanguageNameW
_hread
SetCommConfig
WritePrivateProfileStructA
FreeEnvironmentStringsW
CreateTimerQueueTimer
FindVolumeClose
LeaveCriticalSection
WriteConsoleInputA
TlsSetValue
SetComputerNameExW
FindAtomA
BuildCommDCBAndTimeoutsA
LocalAlloc
VerifyVersionInfoA
TlsGetValue
GetCommandLineW
InterlockedExchange
CopyFileW
AddRefActCtx
OutputDebugStringW
FormatMessageW
GetPriorityClass
WritePrivateProfileStringW
GetUserDefaultLangID
TerminateThread
GlobalUnfix
HeapValidate
GetStartupInfoA
CreatePipe
GetCPInfoExA
GetSystemWindowsDirectoryA
WriteProfileSectionA
GetCalendarInfoA
DebugBreak
GetConsoleCursorInfo
SetLastError
DeleteVolumeMountPointA
DebugActiveProcessStop
lstrcmpA
GetPrivateProfileSectionNamesA
GetSystemWindowsDirectoryW
CreateActCtxW
SetMailslotInfo
GetPrivateProfileIntW
_lread
OutputDebugStringA
InterlockedDecrement
DefineDosDeviceW
SetVolumeMountPointW
SetThreadIdealProcessor
SetConsoleActiveScreenBuffer
GetProcessAffinityMask
GlobalAddAtomW
SetConsoleWindowInfo
EndUpdateResourceA
ContinueDebugEvent
MoveFileW
ReadConsoleA
WriteConsoleA
VirtualProtect
BuildCommDCBA
InterlockedFlushSList
WritePrivateProfileSectionW
DeleteCriticalSection
GetFileAttributesExW
FileTimeToLocalFileTime
GetVolumePathNameW
GetConsoleMode
HeapWalk
GetComputerNameW
FindActCtxSectionStringA
ReadProcessMemory
MoveFileExA
GetProcAddress
GlobalFix
GlobalDeleteAtom
FatalExit
InterlockedExchangeAdd
WaitNamedPipeA
SetSystemTime
GetLocalTime
FreeEnvironmentStringsA
OpenSemaphoreA
GetPrivateProfileStructA
EnumCalendarInfoExA
GetMailslotInfo
lstrcpyA
LockFile
EndUpdateResourceW
GetConsoleCP
GetConsoleAliasW
GetLargestConsoleWindowSize
FindAtomW
GetConsoleAliasExesLengthA
WriteConsoleInputW
CreateMailslotW
EnumDateFormatsW
SetCommState
_lopen
GetConsoleAliasExesLengthW
ResetWriteWatch
GetPrivateProfileStringW
ClearCommError
CreateIoCompletionPort
LoadLibraryW
ChangeTimerQueueTimer
GetFileInformationByHandle
GetLastError
SetFirmwareEnvironmentVariableW
MoveFileA
GetConsoleDisplayMode
GetSystemDefaultLangID
LocalLock
GetCommMask
SetMessageWaitingIndicator
AreFileApisANSI
OpenWaitableTimerA
GetProcessShutdownParameters
PeekNamedPipe
FillConsoleOutputCharacterW
FindNextVolumeMountPointW
WriteProfileStringW
DeleteAtom
AddAtomW
WriteConsoleOutputCharacterA
AssignProcessToJobObject
QueryDosDeviceW
EnterCriticalSection
GetConsoleAliasExesW
GetBinaryTypeA
DeleteFileA
RaiseException
GetCommandLineA
IsBadReadPtr
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
CloseHandle
GetModuleHandleW
Sleep
InterlockedIncrement
TlsAlloc
GetCurrentThreadId
TlsFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleW
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
CreateFileA
user32
OemToCharW
Sections
.text Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 176KB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ