C:\gusel\sicocuvoyo\zemukokota-y.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3668ad791a0f6a1eae6047cec55548c7fc64ceb4d89e73262695b52e144f3b13.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3668ad791a0f6a1eae6047cec55548c7fc64ceb4d89e73262695b52e144f3b13.exe
Resource
win10v2004-20241007-en
General
-
Target
3668ad791a0f6a1eae6047cec55548c7fc64ceb4d89e73262695b52e144f3b13
-
Size
266KB
-
MD5
43eb967fce9ffe2d06c1174b0bc416f6
-
SHA1
6dde42f13384300c122bc396c05f70f2c9f13653
-
SHA256
3668ad791a0f6a1eae6047cec55548c7fc64ceb4d89e73262695b52e144f3b13
-
SHA512
a783071f48acf905634c2c60ea9487fbdbb90706dd6884dde32ac980eda3e909e8835bf99b466b72f9fc6f1fa2bc0d93b45c7439cf5f5c6445816733c0cc7b7f
-
SSDEEP
6144:fDREIYijYDnEWyufE7EvOwN2UUhufKRfXQmpC5s:NEIYbLsufiEvOWYufEfgoC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3668ad791a0f6a1eae6047cec55548c7fc64ceb4d89e73262695b52e144f3b13
Files
-
3668ad791a0f6a1eae6047cec55548c7fc64ceb4d89e73262695b52e144f3b13.exe windows:5 windows x86 arch:x86
cc90a95f827a6722ac0240bfbd938308
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenMutexA
GetSystemTimeAdjustment
VerSetConditionMask
SetLocaleInfoW
FindNextVolumeA
HeapWalk
GetNamedPipeHandleStateW
FileTimeToLocalFileTime
FillConsoleOutputCharacterW
VirtualFree
TerminateProcess
GetLastError
GetVersionExA
FreeResource
EnumResourceNamesW
FindNextFileA
CopyFileExA
BuildCommDCBW
SetDefaultCommConfigA
WritePrivateProfileStructA
LocalCompact
ChangeTimerQueueTimer
ReadConsoleInputA
WriteConsoleInputA
LoadResource
AddAtomA
SearchPathW
GetThreadTimes
CallNamedPipeW
GetDriveTypeA
BuildCommDCBAndTimeoutsW
VirtualProtect
LoadLibraryA
LocalAlloc
SetProcessPriorityBoost
GetProfileSectionA
FindFirstChangeNotificationA
VerifyVersionInfoA
FormatMessageW
SetDllDirectoryW
GetModuleHandleW
WritePrivateProfileStringA
GetUserDefaultLCID
GetProcessHeap
SetWaitableTimer
SetConsoleTextAttribute
InterlockedDecrement
GetStartupInfoW
GetSystemWow64DirectoryA
CopyFileA
SetCalendarInfoA
DebugBreak
EndUpdateResourceW
SetLastError
FatalAppExitW
SetSystemTime
OpenFileMappingA
GetConsoleAliasExesLengthA
lstrcmpA
WriteFileGather
FlushConsoleInputBuffer
SetDefaultCommConfigW
ContinueDebugEvent
VirtualAllocEx
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryW
GetACP
GlobalFindAtomA
lstrcatA
SetMailslotInfo
CreateActCtxW
_lwrite
OutputDebugStringA
CreateNamedPipeA
GetAtomNameW
SetConsoleActiveScreenBuffer
EnumResourceTypesW
lstrlenA
WriteConsoleW
lstrcpyA
ReadConsoleOutputW
GetThreadContext
ReleaseActCtx
GetStringTypeA
GetPrivateProfileStringA
GetDriveTypeW
GetFileAttributesExW
LocalFileTimeToFileTime
MoveFileA
GetVolumePathNameA
GetCommMask
SetFileShortNameW
VerLanguageNameW
LockFile
ProcessIdToSessionId
GetQueuedCompletionStatus
AllocConsole
GlobalGetAtomNameA
SetComputerNameA
GetConsoleAliasExesLengthW
WriteConsoleInputW
CreateMailslotW
SystemTimeToTzSpecificLocalTime
MoveFileWithProgressA
DebugActiveProcessStop
GetStringTypeExA
EnumSystemLocalesA
GetPrivateProfileIntA
GetModuleHandleA
OpenMutexW
GetModuleFileNameW
OpenWaitableTimerA
GetConsoleAliasesLengthW
GlobalUnWire
FillConsoleOutputCharacterA
GetCompressedFileSizeA
FindNextVolumeMountPointA
SetThreadPriority
ReadConsoleW
MapUserPhysicalPagesScatter
WriteConsoleOutputCharacterW
QueryInformationJobObject
GetDateFormatW
GetConsoleAliasExesW
EnumDateFormatsA
RaiseException
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedIncrement
GetOEMCP
GetCPInfo
IsValidCodePage
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
HeapFree
WriteFile
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CloseHandle
FlushFileBuffers
Sections
.text Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ