C:\davihake_84-garibexisabal52\xazuhiha.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2e0b82825c79c507de8a011d6a47f461b8c6b73d7c130fa91dbc2487c8726e13.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e0b82825c79c507de8a011d6a47f461b8c6b73d7c130fa91dbc2487c8726e13.exe
Resource
win10v2004-20241007-en
General
-
Target
2e0b82825c79c507de8a011d6a47f461b8c6b73d7c130fa91dbc2487c8726e13
-
Size
230KB
-
MD5
be0c6f5117ffbe12c44d24836ed9e094
-
SHA1
69f344803ca11eb44f5e1a4c2069a4002fabda45
-
SHA256
2e0b82825c79c507de8a011d6a47f461b8c6b73d7c130fa91dbc2487c8726e13
-
SHA512
8c63a3fa71a01ad2aaaf8a2d4e5800c8fb187f712e9836ef3c1783429f52497cbed6785afc86315ab4388e08e1b62f1854e73421098bf9b58850495c86d441a3
-
SSDEEP
3072:8dd0qhbstIMasLO308JLcdatpRN9lnT2pjLZM3cOlsGIByM/h3qpZa9uD6Vdyhk7:JqhqXFNeLBN9JTMjtM3cOlqyrwVfEz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e0b82825c79c507de8a011d6a47f461b8c6b73d7c130fa91dbc2487c8726e13
Files
-
2e0b82825c79c507de8a011d6a47f461b8c6b73d7c130fa91dbc2487c8726e13.exe windows:5 windows x86 arch:x86
ad9d4e4622e97998422095eb0ec4b87f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleFileNameA
FoldStringA
InterlockedIncrement
_hread
CancelWaitableTimer
WaitNamedPipeA
BuildCommDCBA
GetConsoleAliasExesLengthW
PeekConsoleInputA
CreateFileA
RegisterWaitForSingleObject
LoadLibraryA
EnumResourceTypesA
TransmitCommChar
GetFirmwareEnvironmentVariableA
GetModuleFileNameW
BeginUpdateResourceA
GetConsoleAliasExesLengthA
WriteConsoleA
LoadLibraryW
WriteConsoleW
DeleteFileW
FillConsoleOutputCharacterW
GetProcAddress
GetSystemDefaultLCID
GetConsoleAliasW
FindFirstChangeNotificationA
LocalReAlloc
RemoveDirectoryW
lstrcpynW
FindFirstFileExA
AreFileApisANSI
GetCurrentDirectoryW
GetConsoleAliasesLengthW
SetConsoleTitleA
GetBinaryTypeA
GlobalAlloc
FindNextFileA
OpenJobObjectW
HeapFree
_lopen
GetComputerNameW
SetThreadLocale
GetCurrentProcess
TlsGetValue
SetCalendarInfoW
SetComputerNameA
FoldStringW
GetDiskFreeSpaceW
RtlUnwind
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
GetLastError
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
HeapAlloc
TlsAlloc
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RaiseException
LCMapStringW
GetStringTypeW
SetStdHandle
FlushFileBuffers
HeapReAlloc
SetEndOfFile
GetProcessHeap
ReadFile
HeapSize
CreateFileW
user32
ScreenToClient
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 449KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ