C:\gujuzotulipa\ris\huxola\fulabufuped\vemavuxufolevi_rarixexun.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a30cad772cd749c302e5fb9389801e88.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a30cad772cd749c302e5fb9389801e88.exe
Resource
win10v2004-20241007-en
General
-
Target
a30cad772cd749c302e5fb9389801e88
-
Size
407KB
-
MD5
a30cad772cd749c302e5fb9389801e88
-
SHA1
9d0eeb5197238f591d18c21312bb976cefcd76cf
-
SHA256
1d97642f4f6c697662c55c269764c6404f09b8812dada66c7699b2a54f0594d2
-
SHA512
e2250053e8a2a6e1352248a9810edc7343a0e0c282d57cc70be98eb71a07b28d75fae944faceca9a654f0bab16b35e7ace89c39f393a4358203ce130f2e04105
-
SSDEEP
12288:t6PhF7P07sYCWyKrdsHVHBQwT2f2+m6ERNP:407sYz/MhQwibEj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a30cad772cd749c302e5fb9389801e88
Files
-
a30cad772cd749c302e5fb9389801e88.exe windows:5 windows x86 arch:x86
4f12c21112870dd8f8f0042d284bcddd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteProfileSectionA
SetLocaleInfoA
FindFirstVolumeA
GetNamedPipeHandleStateW
CompareFileTime
EnumResourceTypesA
EnumResourceNamesA
FillConsoleOutputCharacterA
GetTimeZoneInformation
TerminateThread
SignalObjectAndWait
GetVersionExW
VerifyVersionInfoA
QueryDepthSList
SetEvent
FindNextFileW
BuildCommDCBAndTimeoutsA
GetCompressedFileSizeA
CopyFileExW
ReadConsoleOutputCharacterA
SetDefaultCommConfigW
VerLanguageNameA
EscapeCommFunction
WritePrivateProfileStructA
FreeEnvironmentStringsA
CreateTimerQueue
FindNextVolumeMountPointA
ResetWriteWatch
WriteConsoleInputA
SetComputerNameExA
FindAtomA
LoadResource
GetThreadPriority
CallNamedPipeW
GetDriveTypeA
BuildCommDCBAndTimeoutsW
VirtualProtect
LocalAlloc
GetProfileSectionA
GetCommandLineA
InterlockedExchange
FindFirstChangeNotificationW
GetCalendarInfoA
ReleaseActCtx
FindResourceA
FormatMessageA
SetDllDirectoryW
GetModuleHandleW
WritePrivateProfileStringA
GetUserDefaultLangID
TerminateProcess
GlobalFix
HeapValidate
InterlockedCompareExchange
GetStartupInfoW
SetCalendarInfoW
DebugBreak
SetConsoleTextAttribute
GetLastError
CopyFileA
DisconnectNamedPipe
GetCPInfoExW
GetComputerNameExW
ContinueDebugEvent
InterlockedExchangeAdd
GetACP
GetPrivateProfileStringA
CreateActCtxA
GetConsoleAliasW
OutputDebugStringW
lstrlenA
WriteConsoleA
GlobalWire
FormatMessageW
GetPrivateProfileSectionNamesA
GetSystemTimeAsFileTime
EnumCalendarInfoA
SetThreadAffinityMask
VerSetConditionMask
CreateConsoleScreenBuffer
GetSystemWindowsDirectoryA
GetProfileStringW
GetQueuedCompletionStatus
AllocConsole
GlobalGetAtomNameW
SetComputerNameW
GetConsoleAliasExesLengthA
WriteConsoleInputW
CreateMailslotW
GetCommState
SetThreadContext
GetSystemTimeAdjustment
_lwrite
_lopen
EnumSystemLocalesW
GetConsoleAliasExesLengthW
MoveFileA
GetWriteWatch
GetPrivateProfileStringW
GetModuleHandleA
DeleteAtom
LoadLibraryW
EnumDateFormatsA
WriteConsoleOutputCharacterA
TlsFree
SetFirmwareEnvironmentVariableW
GetProfileSectionW
CommConfigDialogW
GetConsoleAliasesLengthA
CancelDeviceWakeupRequest
AreFileApisANSI
OpenWaitableTimerW
OpenFileMappingW
SetProcessAffinityMask
GetConsoleAliasesLengthW
SetProcessShutdownParameters
FindNextVolumeMountPointW
SetThreadPriority
ReadConsoleW
WriteConsoleOutputCharacterW
GetNumberFormatW
GetConsoleAliasExesA
GetBinaryTypeA
EnterCriticalSection
InitializeCriticalSection
GetSystemWow64DirectoryW
LoadLibraryA
DeleteFileA
RaiseException
GetStartupInfoA
IsBadReadPtr
DeleteCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetProcAddress
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
InterlockedIncrement
InterlockedDecrement
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
SetLastError
SetHandleCount
GetStdHandle
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
OutputDebugStringA
WriteConsoleW
GetConsoleOutputCP
MultiByteToWideChar
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
gdi32
GetBoundsRect
winhttp
WinHttpConnect
msimg32
AlphaBlend
Sections
.text Size: 187KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 179KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ