C:\xonafobozaxug-gonufuxir67 jigatiwat.pdb
Static task
static1
Behavioral task
behavioral1
Sample
18d42d025dcebc1f5f6066da600f6dc774cc6ed840ccc30d52c4885f2c657e7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
18d42d025dcebc1f5f6066da600f6dc774cc6ed840ccc30d52c4885f2c657e7e.exe
Resource
win10v2004-20241007-en
General
-
Target
18d42d025dcebc1f5f6066da600f6dc774cc6ed840ccc30d52c4885f2c657e7e
-
Size
410KB
-
MD5
35c73d599fa302c8e337d6090315c833
-
SHA1
66dec98c52b2eb0239b23e5309ecd07a47f747d6
-
SHA256
18d42d025dcebc1f5f6066da600f6dc774cc6ed840ccc30d52c4885f2c657e7e
-
SHA512
f1eb6726cf19a95114bc146049de0323da1ae8b6c28d7df97d5507cbd3ffc425bb9e536e19ffaca87e8122f05b8885ca7438579fba2519991be943b3596f01dc
-
SSDEEP
6144:kMRBC/R6TE/iRAtvdnm4iYVC0dbflCZjmUdhTjMmhIkzHf0KRGGDkTB5wCuPG1:AW6tc4iGCyfIZjmFmikzHf0D0kTFiG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 18d42d025dcebc1f5f6066da600f6dc774cc6ed840ccc30d52c4885f2c657e7e
Files
-
18d42d025dcebc1f5f6066da600f6dc774cc6ed840ccc30d52c4885f2c657e7e.exe windows:5 windows x86 arch:x86
2f9c37997e4f6c022f6907755dbb312e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstVolumeW
ExitProcess
GetExitCodeProcess
DeactivateActCtx
GetVersionExW
VerifyVersionInfoA
GetPrivateProfileStringW
GetConsoleCP
TlsGetValue
GetConsoleMode
CopyFileExW
VerLanguageNameW
FindFirstChangeNotificationW
FreeEnvironmentStringsW
RequestWakeupLatency
SetVolumeMountPointW
GetLongPathNameW
SetConsoleCursorInfo
GlobalHandle
SystemTimeToTzSpecificLocalTime
SetProcessShutdownParameters
CompareStringW
LocalLock
GetNamedPipeHandleStateW
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
LocalAlloc
Sleep
MoveFileExA
GetCommandLineW
InterlockedDecrement
InterlockedExchange
DeleteFileW
GetVolumePathNamesForVolumeNameA
GetPrivateProfileStringA
GetPrivateProfileIntW
HeapValidate
GetProcessHeaps
CreateNamedPipeW
GetCPInfoExA
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryA
GetCalendarInfoA
GetLastError
GetStringTypeA
FatalAppExitA
GetThreadSelectorEntry
WaitForDebugEvent
ReadFileScatter
GetTempPathW
GetDefaultCommConfigW
UnmapViewOfFile
GlobalWire
WritePrivateProfileSectionW
TerminateThread
lstrcatW
VirtualLock
CreateActCtxW
InterlockedPopEntrySList
OutputDebugStringW
SetConsoleTitleA
DefineDosDeviceW
LoadLibraryA
WritePrivateProfileStringW
WaitNamedPipeW
InterlockedIncrement
TerminateProcess
SetConsoleMode
PeekConsoleInputW
ReadConsoleOutputW
GetNumaProcessorNode
DuplicateHandle
GetPrivateProfileSectionNamesA
EnumTimeFormatsA
SetLocalTime
FindNextFileA
FindFirstFileW
CreateSemaphoreA
OutputDebugStringA
lstrcpyW
HeapSetInformation
CreateHardLinkA
SetThreadExecutionState
GetSystemTime
LockFile
EnumCalendarInfoExA
MoveFileExW
GetVolumePathNamesForVolumeNameW
SetConsoleScreenBufferSize
SearchPathA
GetOverlappedResult
IsBadStringPtrA
GetAtomNameW
GetConsoleAliasExesLengthA
WriteConsoleInputA
LocalUnlock
SetCommConfig
_lopen
EnumSystemLocalesA
GetCommState
SetEndOfFile
GetWriteWatch
UnhandledExceptionFilter
OpenSemaphoreA
GetConsoleScreenBufferInfo
EnumDateFormatsW
GetSystemTimeAdjustment
ZombifyActCtx
GetComputerNameA
HeapCompact
CommConfigDialogA
GetModuleFileNameA
OpenMutexA
AllocateUserPhysicalPages
FindResourceA
DeleteTimerQueueTimer
EnumResourceNamesA
CreateTimerQueueTimer
GetProcessTimes
UnregisterWait
IsBadWritePtr
GetCurrentProcessId
FatalAppExitW
GetFileAttributesA
lstrcpynW
SetNamedPipeHandleState
WriteConsoleOutputAttribute
GetCompressedFileSizeA
SetFileShortNameA
GetFullPathNameW
WriteProfileStringW
AddVectoredExceptionHandler
GlobalAddAtomA
EnumDateFormatsExW
TerminateJobObject
QueryDosDeviceA
LeaveCriticalSection
GetBinaryTypeA
SetCurrentDirectoryA
CloseHandle
CreateFileW
GetNumberFormatW
OpenFileMappingA
EncodePointer
DecodePointer
MoveFileA
GetStartupInfoW
IsBadReadPtr
GetModuleHandleW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapCreate
WriteFile
EnterCriticalSection
HeapAlloc
HeapReAlloc
HeapSize
HeapQueryInformation
GetCurrentProcess
IsDebuggerPresent
HeapFree
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
LoadLibraryW
RtlUnwind
WriteConsoleW
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
RaiseException
SetStdHandle
FlushFileBuffers
user32
GetCursorInfo
gdi32
GetBitmapBits
Sections
.text Size: 303KB - Virtual size: 303KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 561KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ