C:\mayumabumu zogune\gebosafaw71_fur\fuc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae9dd92b1a208399add6494df81aa5dfc48f810582d83d89817e582bcf3c543f.exe
Resource
win7-20240903-en
General
-
Target
ae9dd92b1a208399add6494df81aa5dfc48f810582d83d89817e582bcf3c543f
-
Size
394KB
-
MD5
9018c7e286179505cb948bdef3614f3a
-
SHA1
e9c7b16245a84a3bf96d5f82ca082425bd6dbf94
-
SHA256
ae9dd92b1a208399add6494df81aa5dfc48f810582d83d89817e582bcf3c543f
-
SHA512
4140047619bc4ca297b6e58757a68cea2c39abf2fc5b1ce47b6ea95ea3d50371f3405bc20b17743c8e1aeb678f637dfd3e7ace1bfd3fdbeaacf6faff715e2b76
-
SSDEEP
6144:Jzb+NiNPJe5OAHVYpoXX1hRFXTCQoyivDIBP9sWxzWKk4CFVS:gNYPJewAHcoXFh3XTQyiS9fz2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ae9dd92b1a208399add6494df81aa5dfc48f810582d83d89817e582bcf3c543f
Files
-
ae9dd92b1a208399add6494df81aa5dfc48f810582d83d89817e582bcf3c543f.exe windows:5 windows x86 arch:x86
7e41612e1e386255ee88886121b77ed9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
FileTimeToDosDateTime
EnumResourceNamesW
FindFirstChangeNotificationW
CopyFileExW
SetLocalTime
GetCPInfo
GetConsoleAliasExesLengthA
HeapAlloc
InterlockedIncrement
GetCommState
InterlockedDecrement
GlobalSize
GetSystemWindowsDirectoryW
GlobalLock
GetProfileSectionA
GetModuleHandleW
GetTickCount
GetPrivateProfileStringW
ReadConsoleW
TlsSetValue
ActivateActCtx
GlobalAlloc
GetVolumeInformationA
LoadLibraryW
TerminateThread
IsProcessorFeaturePresent
GetCompressedFileSizeA
lstrlenW
SetThreadPriority
DeactivateActCtx
GetNamedPipeHandleStateW
LCMapStringA
GetPrivateProfileIntW
CreateDirectoryA
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetStdHandle
GetLastError
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
EnterCriticalSection
CreateMemoryResourceNotification
DisableThreadLibraryCalls
Process32FirstW
WritePrivateProfileStringA
SetCurrentDirectoryW
HeapWalk
FindAtomA
SetSystemTime
SetEnvironmentVariableA
FreeEnvironmentStringsW
EnumResourceNamesA
FindNextFileW
GetStringTypeW
WriteProfileStringW
CompareStringA
GetCurrentThreadId
GetCPInfoExA
GetVersionExA
UnregisterWaitEx
TlsFree
FlushFileBuffers
CloseHandle
MultiByteToWideChar
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
DeleteCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
SetLastError
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
user32
GetMenuCheckMarkDimensions
winhttp
WinHttpCloseHandle
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 141KB - Virtual size: 19.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ