C:\saxovove\31\xejerosulugik\94 ha.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e4564b9719e11dd2f24ce5efc7b9754bf512cac02ac5cc2a8d7226877007ab33.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e4564b9719e11dd2f24ce5efc7b9754bf512cac02ac5cc2a8d7226877007ab33.exe
Resource
win10v2004-20241007-en
General
-
Target
e4564b9719e11dd2f24ce5efc7b9754bf512cac02ac5cc2a8d7226877007ab33
-
Size
394KB
-
MD5
6aa7cbbd65b6015c6b8237230df15387
-
SHA1
093ce5c60ee64d01fc47592bd1a47eaa94fa9f23
-
SHA256
e4564b9719e11dd2f24ce5efc7b9754bf512cac02ac5cc2a8d7226877007ab33
-
SHA512
797fcdbe170032758afcda568eee33a3901e5f92c23d2a6a2a621ba8181eee95117aec25bdb0b9abb2ef06d0e75506b784c3cac094603c9d7b5576e078568bc3
-
SSDEEP
6144:lPi6qmtILCIkpkM6TocNPoK6PoeZWubwJzOPajIJ+ZMabu0xJMan11zA:l6UWLHkp5In8wJkajQ+eVIJMaQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e4564b9719e11dd2f24ce5efc7b9754bf512cac02ac5cc2a8d7226877007ab33
Files
-
e4564b9719e11dd2f24ce5efc7b9754bf512cac02ac5cc2a8d7226877007ab33.exe windows:5 windows x86 arch:x86
18f86aab7a3779fc3e6eb84d32d1d0ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenFileMappingA
FindFirstVolumeW
WaitForSingleObject
GetNamedPipeHandleStateW
CreateNamedPipeA
CallNamedPipeW
TerminateProcess
FatalExit
GetVersionExA
CopyFileExA
GetConsoleCP
VerifyVersionInfoA
VerLanguageNameW
FindFirstFileExA
FindFirstChangeNotificationA
FreeEnvironmentStringsW
GetProcessPriorityBoost
SetVolumeMountPointA
GetLongPathNameA
CopyFileA
TlsGetValue
VerifyVersionInfoW
GetConsoleCursorInfo
SystemTimeToTzSpecificLocalTime
GetProcessShutdownParameters
MultiByteToWideChar
GetNamedPipeHandleStateA
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
GlobalAlloc
Sleep
MoveFileW
GetCommandLineA
InterlockedDecrement
DeleteFileW
GetVolumePathNamesForVolumeNameW
GetPrivateProfileStringA
GetPrivateProfileIntW
HeapSize
GetProcessHeap
CreateNamedPipeW
SetFileShortNameA
GetStartupInfoW
GetEnvironmentVariableA
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryA
GetLastError
GetProfileStringW
GetCalendarInfoW
SetLastError
GetExitCodeThread
DebugBreak
ReadFileScatter
ReadFile
SetDefaultCommConfigA
GetNumberOfConsoleMouseButtons
GlobalWire
WritePrivateProfileSectionW
WriteProfileStringA
lstrcatW
FindCloseChangeNotification
CreateActCtxW
InterlockedPopEntrySList
InterlockedExchange
SetConsoleTitleW
DefineDosDeviceA
LoadLibraryA
WritePrivateProfileStringA
WaitNamedPipeW
SetSystemTimeAdjustment
GetConsoleMode
UnregisterWaitEx
PeekConsoleInputA
GetNumberFormatA
GetFullPathNameA
FindResourceExA
FindNextFileW
FindFirstFileW
FreeEnvironmentStringsA
CreateSemaphoreW
EnumTimeFormatsA
SetLocalTime
OutputDebugStringW
lstrcpyA
HeapWalk
CreateHardLinkW
RaiseException
GetSystemTime
LockFile
EnumCalendarInfoExA
MoveFileExA
SetConsoleScreenBufferSize
SearchPathW
IsBadStringPtrA
GetAtomNameA
GetConsoleAliasExesLengthA
WriteConsoleInputW
LocalLock
EnumDateFormatsW
SetCommState
GetSystemTimeAdjustment
EnumSystemLocalesA
GetNumaHighestNodeNumber
SetEndOfFile
ResetWriteWatch
SetUnhandledExceptionFilter
OpenSemaphoreW
GetLargestConsoleWindowSize
ReleaseActCtx
GetComputerNameA
HeapValidate
OpenMutexW
GetStringTypeA
SetSystemPowerState
FindResourceW
SetTimerQueueTimer
EnumResourceNamesA
GetProcessTimes
RegisterWaitForSingleObject
IsBadWritePtr
GetCurrentProcessId
FatalAppExitA
GetFileAttributesW
lstrcpynW
DisconnectNamedPipe
FillConsoleOutputCharacterA
GetCompressedFileSizeA
SetFileShortNameW
GetFullPathNameW
WriteProfileStringW
SetInformationJobObject
GlobalAddAtomA
SetCurrentDirectoryA
CreateTimerQueueTimer
LeaveCriticalSection
FlushFileBuffers
CloseHandle
GetCommandLineW
HeapSetInformation
IsBadReadPtr
InterlockedIncrement
DecodePointer
GetModuleHandleW
ExitProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetModuleFileNameW
WriteFile
GetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
EnterCriticalSection
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapQueryInformation
HeapFree
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
LoadLibraryW
RtlUnwind
IsProcessorFeaturePresent
OutputDebugStringA
WriteConsoleW
WideCharToMultiByte
LCMapStringW
GetStringTypeW
SetFilePointer
SetStdHandle
CreateFileW
DeleteFileA
user32
GetMenuItemID
Sections
.text Size: 302KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 557KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ