C:\gujuzotulipa\ris\huxola\fulabufuped\vemavuxufolevi_rarixexun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9.exe
Resource
win10v2004-20241007-en
General
-
Target
2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9
-
Size
407KB
-
MD5
275bd8bebd3dcfa705549d1b28d958f4
-
SHA1
4d8dfc0e393e511b16b89c4917c9900d14ecf6ec
-
SHA256
2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9
-
SHA512
39889925066c52bd6ead8d871775de1511f47f8a813a45b0cd1c2f49bb48c42926bd6248507eed94a91fbf12b50b8fd83e889bc5f3fcf69dbf406b1570bdba60
-
SSDEEP
12288:t6PhF7P07sYCWyKrdsHVHBQwT2f2+m6ERNP:407sYz/MhQwibEj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9
Files
-
2a41e818b41659461ad48edb8287ca2d3667b1221120a0b2037e19c99956c0b9.exe windows:5 windows x86 arch:x86
4f12c21112870dd8f8f0042d284bcddd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteProfileSectionA
SetLocaleInfoA
FindFirstVolumeA
GetNamedPipeHandleStateW
CompareFileTime
EnumResourceTypesA
EnumResourceNamesA
FillConsoleOutputCharacterA
GetTimeZoneInformation
TerminateThread
SignalObjectAndWait
GetVersionExW
VerifyVersionInfoA
QueryDepthSList
SetEvent
FindNextFileW
BuildCommDCBAndTimeoutsA
GetCompressedFileSizeA
CopyFileExW
ReadConsoleOutputCharacterA
SetDefaultCommConfigW
VerLanguageNameA
EscapeCommFunction
WritePrivateProfileStructA
FreeEnvironmentStringsA
CreateTimerQueue
FindNextVolumeMountPointA
ResetWriteWatch
WriteConsoleInputA
SetComputerNameExA
FindAtomA
LoadResource
GetThreadPriority
CallNamedPipeW
GetDriveTypeA
BuildCommDCBAndTimeoutsW
VirtualProtect
LocalAlloc
GetProfileSectionA
GetCommandLineA
InterlockedExchange
FindFirstChangeNotificationW
GetCalendarInfoA
ReleaseActCtx
FindResourceA
FormatMessageA
SetDllDirectoryW
GetModuleHandleW
WritePrivateProfileStringA
GetUserDefaultLangID
TerminateProcess
GlobalFix
HeapValidate
InterlockedCompareExchange
GetStartupInfoW
SetCalendarInfoW
DebugBreak
SetConsoleTextAttribute
GetLastError
CopyFileA
DisconnectNamedPipe
GetCPInfoExW
GetComputerNameExW
ContinueDebugEvent
InterlockedExchangeAdd
GetACP
GetPrivateProfileStringA
CreateActCtxA
GetConsoleAliasW
OutputDebugStringW
lstrlenA
WriteConsoleA
GlobalWire
FormatMessageW
GetPrivateProfileSectionNamesA
GetSystemTimeAsFileTime
EnumCalendarInfoA
SetThreadAffinityMask
VerSetConditionMask
CreateConsoleScreenBuffer
GetSystemWindowsDirectoryA
GetProfileStringW
GetQueuedCompletionStatus
AllocConsole
GlobalGetAtomNameW
SetComputerNameW
GetConsoleAliasExesLengthA
WriteConsoleInputW
CreateMailslotW
GetCommState
SetThreadContext
GetSystemTimeAdjustment
_lwrite
_lopen
EnumSystemLocalesW
GetConsoleAliasExesLengthW
MoveFileA
GetWriteWatch
GetPrivateProfileStringW
GetModuleHandleA
DeleteAtom
LoadLibraryW
EnumDateFormatsA
WriteConsoleOutputCharacterA
TlsFree
SetFirmwareEnvironmentVariableW
GetProfileSectionW
CommConfigDialogW
GetConsoleAliasesLengthA
CancelDeviceWakeupRequest
AreFileApisANSI
OpenWaitableTimerW
OpenFileMappingW
SetProcessAffinityMask
GetConsoleAliasesLengthW
SetProcessShutdownParameters
FindNextVolumeMountPointW
SetThreadPriority
ReadConsoleW
WriteConsoleOutputCharacterW
GetNumberFormatW
GetConsoleAliasExesA
GetBinaryTypeA
EnterCriticalSection
InitializeCriticalSection
GetSystemWow64DirectoryW
LoadLibraryA
DeleteFileA
RaiseException
GetStartupInfoA
IsBadReadPtr
DeleteCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetProcAddress
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
InterlockedIncrement
InterlockedDecrement
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
SetLastError
SetHandleCount
GetStdHandle
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
WriteConsoleW
GetConsoleOutputCP
MultiByteToWideChar
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
gdi32
GetBoundsRect
winhttp
WinHttpConnect
msimg32
AlphaBlend
Sections
.text Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 179KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ