C:\verazupu52-zibusevexi100\huwicuv\gux.pdb
Static task
static1
Behavioral task
behavioral1
Sample
63e559068dab02127878308ae248319b156ee57d6540fc6281ca854e85e39b8f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
63e559068dab02127878308ae248319b156ee57d6540fc6281ca854e85e39b8f.exe
Resource
win10v2004-20241007-en
General
-
Target
84e599529e8dfea27ef8334265c34001698bbf19bc8a8a13c215167a90c9d8f0
-
Size
262KB
-
MD5
a043ddab8c5bd0a85c49e0ac25d0d013
-
SHA1
31a957eb899ecdd3d3fede82d96e16826ddda5ad
-
SHA256
84e599529e8dfea27ef8334265c34001698bbf19bc8a8a13c215167a90c9d8f0
-
SHA512
2a1c00f8422836d2b3035bbdd435b63a5c3bca2febfacef5f4fdde38947c438dbd206fd7da0c8583be2e9d654232f5d28fdb491ec5bd8e2ed87302ba9fb0bf8a
-
SSDEEP
6144:RtknajSfQbtZjMOlRSJiwL7a6Wa5KdSC3:Rt5jS6t5MOzSD5q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/63e559068dab02127878308ae248319b156ee57d6540fc6281ca854e85e39b8f
Files
-
84e599529e8dfea27ef8334265c34001698bbf19bc8a8a13c215167a90c9d8f0.zip
-
63e559068dab02127878308ae248319b156ee57d6540fc6281ca854e85e39b8f.exe windows:5 windows x86 arch:x86
0a73659603f5743398664267df75a188
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
LoadLibraryW
CallNamedPipeA
EnumSystemCodePagesW
EnumDateFormatsW
OpenMutexW
GetConsoleAliasesLengthW
AreFileApisANSI
EnumCalendarInfoExW
RequestWakeupLatency
GetConsoleAliasW
GetModuleHandleA
CreateDirectoryExW
GetLogicalDriveStringsA
ReadConsoleInputW
FindNextVolumeMountPointA
SearchPathA
MoveFileW
CallNamedPipeW
GetCurrentDirectoryW
GetSystemDirectoryW
CreateMailslotA
CommConfigDialogW
GetProcAddress
LocalAlloc
ExitThread
FindResourceA
GetConsoleAliasExesLengthA
GetCPInfoExA
FindResourceW
ContinueDebugEvent
InterlockedCompareExchange
GetConsoleSelectionInfo
FindFirstVolumeW
LocalFree
GlobalFlags
GetNumberOfConsoleMouseButtons
ActivateActCtx
SetConsoleCtrlHandler
MoveFileA
PeekNamedPipe
FindNextVolumeW
FreeEnvironmentStringsA
BackupWrite
SetVolumeMountPointA
ClearCommError
lstrlenW
CreateDirectoryW
GlobalFindAtomA
OpenJobObjectA
lstrcpynA
CopyFileW
InterlockedDecrement
SetFileApisToANSI
GetTickCount
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
Sleep
HeapSize
ExitProcess
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapAlloc
HeapReAlloc
VirtualAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
CloseHandle
FlushFileBuffers
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 186KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ