C:\hecadifisebo\cekugakam\zocux.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3be9da09c5daee48ef47fb8b6aa5fcecb63013364b81d771af3100edf476a420.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3be9da09c5daee48ef47fb8b6aa5fcecb63013364b81d771af3100edf476a420.exe
Resource
win10v2004-20241007-en
General
-
Target
3be9da09c5daee48ef47fb8b6aa5fcecb63013364b81d771af3100edf476a420
-
Size
219KB
-
MD5
ec2b6b61985fc6ca547d233a15e5c28b
-
SHA1
1f9088d9ff0c6e27d040cc65ea89d2203891b45e
-
SHA256
3be9da09c5daee48ef47fb8b6aa5fcecb63013364b81d771af3100edf476a420
-
SHA512
b111287561141bfb32ce78d64a713a29fa627b9fa24071cea2966f532c277985611e80382393105839bca7cbdfacc6d24be8ac1c4e13d8033641c4649738e0b5
-
SSDEEP
3072:0U1lWplor2ECGNIwjFQ1u8shLrq0MfYn9j5Dcyy8Th9pM/h3isxkgaBCh:Z1se2uNT0u8x0MfY9j5Dch4peiga
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3be9da09c5daee48ef47fb8b6aa5fcecb63013364b81d771af3100edf476a420
Files
-
3be9da09c5daee48ef47fb8b6aa5fcecb63013364b81d771af3100edf476a420.exe windows:5 windows x86 arch:x86
167a11a5e44af6f0ea8f611729619ccb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringW
InterlockedDecrement
_lwrite
CancelWaitableTimer
WaitNamedPipeW
BuildCommDCBA
GetConsoleAliasExesLengthA
PeekConsoleInputW
CreateFileW
EnumResourceTypesW
GetCPInfoExA
GetFirmwareEnvironmentVariableW
GetModuleFileNameA
BeginUpdateResourceA
WriteConsoleA
DeleteFileA
LocalAlloc
GetProcAddress
GetModuleHandleW
GetUserDefaultLCID
GetConsoleAliasA
FindFirstChangeNotificationA
LocalReAlloc
RemoveDirectoryA
lstrcpynW
FindFirstFileExW
AreFileApisANSI
GetCurrentDirectoryW
GetConsoleAliasesLengthW
SetConsoleTitleW
SetThreadLocale
GetSystemDefaultLCID
GetCurrentProcess
FindNextFileW
OpenJobObjectA
_lopen
GetComputerNameW
GetFileAttributesExA
SetComputerNameW
GetDiskFreeSpaceA
SetEndOfFile
FillConsoleOutputCharacterA
RaiseException
RtlUnwind
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
EncodePointer
DecodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
SetFilePointer
MultiByteToWideChar
ReadFile
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
CloseHandle
CreateFileA
LoadLibraryW
HeapReAlloc
LCMapStringW
GetStringTypeW
WriteConsoleW
GetProcessHeap
user32
ScreenToClient
advapi32
IsTokenRestricted
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 451KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ