C:\suyake70\gosokegute\medokami64\vexovuyajey16\bam.pdb
Static task
static1
Behavioral task
behavioral1
Sample
edb8cad07750eb0dae97d6516039461f1a18a17c5d1250881186d424a00f5e44.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edb8cad07750eb0dae97d6516039461f1a18a17c5d1250881186d424a00f5e44.exe
Resource
win10v2004-20241007-en
General
-
Target
edb8cad07750eb0dae97d6516039461f1a18a17c5d1250881186d424a00f5e44
-
Size
443KB
-
MD5
706a5d8705445d5cdd13ae091b6b63f3
-
SHA1
980ca94f575b1d55e074574c0dd3413d58108d0a
-
SHA256
edb8cad07750eb0dae97d6516039461f1a18a17c5d1250881186d424a00f5e44
-
SHA512
d7f1a6d127ebda5fff3d2a19416909c293017f589038006567f2b5ec2a1ade501b2acb85569ff9b02d030b733d07a3988a507ef708b011aeccf9f698b226348f
-
SSDEEP
12288:84hn02P222idHzGbW1YsugUmnyZmFCVMBmvO:bq2zdHzc+frtyZm4MBmvO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource edb8cad07750eb0dae97d6516039461f1a18a17c5d1250881186d424a00f5e44
Files
-
edb8cad07750eb0dae97d6516039461f1a18a17c5d1250881186d424a00f5e44.exe windows:5 windows x86 arch:x86
4bcde812b040ca4f517d950272a8fa16
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateNamedPipeW
TerminateThread
DeactivateActCtx
GetConsoleAliasesLengthW
GetVersionExW
GetConsoleCP
GetDefaultCommConfigW
FindFirstFileExW
GetDriveTypeW
FreeEnvironmentStringsW
GetProcessPriorityBoost
SetVolumeMountPointA
SetCurrentDirectoryW
GetLongPathNameA
TlsGetValue
SetComputerNameExA
FindAtomA
BuildCommDCBAndTimeoutsW
VirtualProtect
LoadLibraryA
GlobalAlloc
TryEnterCriticalSection
TlsSetValue
GetCommandLineA
InterlockedDecrement
GetCalendarInfoA
CopyFileW
ZombifyActCtx
OutputDebugStringA
GetSystemTimeAdjustment
GetPriorityClass
WritePrivateProfileStringW
GetProcessHeaps
GlobalUnWire
GetProcessHeap
GetStartupInfoA
GetDiskFreeSpaceExW
GetCPInfoExW
GetWindowsDirectoryW
GetSystemWow64DirectoryW
GetLastError
GetProfileStringA
WriteProfileSectionW
GetProfileStringW
GetConsoleCursorInfo
SetLastError
DeleteVolumeMountPointA
DebugBreak
GetPrivateProfileSectionW
ReadFileScatter
GetNumberOfConsoleInputEvents
GetSystemWindowsDirectoryW
TerminateProcess
GlobalFindAtomA
FindCloseChangeNotification
CreateActCtxW
SetMailslotInfo
InterlockedExchange
DefineDosDeviceA
FindVolumeMountPointClose
EndUpdateResourceA
WriteConsoleA
GetPrivateProfileSectionA
WritePrivateProfileSectionW
GetPrivateProfileStructA
GetFileAttributesExA
FileTimeToLocalFileTime
MoveFileA
GetVolumePathNameW
HeapUnlock
lstrcmpW
GetComputerNameW
FindActCtxSectionStringA
SetThreadContext
MoveFileExA
GlobalUnlock
UnregisterWait
BuildCommDCBA
GlobalDeleteAtom
GetBinaryTypeA
OpenEventW
SetCommTimeouts
WaitNamedPipeA
FindResourceExW
GetSystemTimeAsFileTime
GetSystemInfo
SetLocalTime
OpenSemaphoreA
FreeEnvironmentStringsA
GetProcAddress
CreateIoCompletionPort
GetPrivateProfileSectionNamesA
SetFileShortNameW
lstrcpyW
VerLanguageNameW
GetThreadSelectorEntry
SetSystemTime
GetConsoleAliasW
SetConsoleScreenBufferSize
AllocConsole
GetAtomNameA
WriteConsoleInputA
TransactNamedPipe
GetCommState
_lopen
ResetWriteWatch
GetConsoleOutputCP
GetModuleHandleA
EnumDateFormatsW
LockFile
GetConsoleAliasExesLengthA
WriteConsoleOutputCharacterW
HeapReAlloc
OpenMutexA
GetStringTypeW
SetFilePointer
PostQueuedCompletionStatus
SetFileApisToANSI
CancelWaitableTimer
GetCurrentProcess
SetNamedPipeHandleState
GetCompressedFileSizeA
FindNextVolumeMountPointW
GetFullPathNameW
WriteProfileStringW
DeleteAtom
GlobalAddAtomA
TerminateJobObject
QueryDosDeviceW
InitializeCriticalSection
SetFirmwareEnvironmentVariableW
GetBinaryTypeW
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
InterlockedCompareExchange
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
LCMapStringA
LCMapStringW
GetCPInfo
HeapValidate
IsBadReadPtr
GetModuleHandleW
TlsAlloc
GetCurrentThreadId
TlsFree
GetStdHandle
WriteFile
WriteConsoleW
GetFileType
OutputDebugStringW
ExitProcess
LoadLibraryW
GetModuleFileNameA
SetHandleCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
HeapAlloc
HeapSize
VirtualAlloc
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
FlushFileBuffers
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
SetStdHandle
CloseHandle
CreateFileA
DeleteFileA
user32
OemToCharA
msimg32
AlphaBlend
Sections
.text Size: 211KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 177KB - Virtual size: 330KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.suvod Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ