C:\jevo\rigo\jesayacacer72_fede-dewayoc31\powe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9701830fc52958002ec355e6493830e56729edb9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9701830fc52958002ec355e6493830e56729edb9.exe
Resource
win10v2004-20241007-en
General
-
Target
9701830fc52958002ec355e6493830e56729edb9
-
Size
415KB
-
MD5
20fd6b9c1ddf425021b2d9f4ea63b1a3
-
SHA1
9701830fc52958002ec355e6493830e56729edb9
-
SHA256
9d6ee8449d75975fcdeaba98d32f000fe6d97b72306c4b9943d31bffd7fc2f31
-
SHA512
008e0d3b953621d5d1160adcef2a458fe72a3707cc7724c860f58b1b9f97433247525653ac06372c53f51a0f0e28cb5fbe632bbaa02726a9cb15a569e25227d1
-
SSDEEP
12288:wXH1ROwdXI9Aariu0wldjGO47L+e6G4YV/W6bXfjHVHg7H:HuX6iQjSj/0DIeqy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9701830fc52958002ec355e6493830e56729edb9
Files
-
9701830fc52958002ec355e6493830e56729edb9.exe windows:5 windows x86 arch:x86
79308deed746567d711b667ee2d6efa1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteProfileSectionA
SetLocaleInfoA
FindFirstVolumeA
FlushConsoleInputBuffer
HeapWalk
FindFirstChangeNotificationA
PulseEvent
GetNamedPipeHandleStateW
CompareFileTime
EnumResourceTypesA
EnumResourceNamesA
FillConsoleOutputCharacterW
GetTimeZoneInformation
TerminateThread
SignalObjectAndWait
GetVersionExW
VerifyVersionInfoA
QueryDepthSList
SetEvent
FindNextFileA
BuildCommDCBAndTimeoutsA
GetCompressedFileSizeA
CopyFileExW
ReadConsoleOutputCharacterA
SetDefaultCommConfigW
VerLanguageNameA
EscapeCommFunction
WritePrivateProfileStructA
FreeEnvironmentStringsA
CreateTimerQueue
FindNextVolumeMountPointA
ResetWriteWatch
WriteConsoleInputA
SetComputerNameExA
FindAtomA
LoadResource
GetThreadPriority
CallNamedPipeW
BuildCommDCBAndTimeoutsW
VirtualProtect
GetModuleHandleA
LocalAlloc
GlobalUnfix
GetProfileSectionW
GetCommandLineA
InterlockedExchange
FindFirstChangeNotificationW
GetCalendarInfoA
ReleaseActCtx
OutputDebugStringW
FormatMessageA
SetDllDirectoryW
WritePrivateProfileStringA
GetUserDefaultLangID
GlobalFix
GetVersionExA
HeapValidate
InterlockedCompareExchange
CopyFileA
GetLastError
SetCalendarInfoW
DebugBreak
SetConsoleTextAttribute
SetLastError
GetSystemWow64DirectoryW
GetStartupInfoW
DisconnectNamedPipe
GetComputerNameExW
GetPrivateProfileSectionNamesA
ContinueDebugEvent
InterlockedExchangeAdd
GetSystemWindowsDirectoryW
CopyFileW
GetACP
GetPrivateProfileStringA
CreateActCtxA
GetConsoleAliasW
OutputDebugStringA
lstrlenA
WriteConsoleA
GetPrivateProfileSectionNamesW
GlobalWire
FormatMessageW
GetSystemTimeAsFileTime
EnumCalendarInfoA
SetThreadAffinityMask
VerSetConditionMask
CreateConsoleScreenBuffer
GetSystemWindowsDirectoryA
GetProfileStringW
CreateIoCompletionPort
AllocConsole
GlobalGetAtomNameW
SetComputerNameW
GetConsoleAliasExesLengthW
WriteConsoleInputW
CreateMailslotW
GetCommState
SetThreadContext
GetSystemTimeAdjustment
_lwrite
_lopen
EnumSystemLocalesW
GetConsoleAliasExesLengthA
MoveFileA
GetWriteWatch
OpenSemaphoreW
GetPrivateProfileStringW
DeleteAtom
EnumDateFormatsA
LoadLibraryW
WriteConsoleOutputCharacterA
TlsFree
GetProfileSectionA
CreateActCtxW
CreateJobSet
CancelDeviceWakeupRequest
AreFileApisANSI
OpenWaitableTimerA
OpenFileMappingA
SetProcessAffinityMask
GetConsoleAliasesLengthW
SetProcessShutdownParameters
FillConsoleOutputCharacterA
FindNextVolumeMountPointW
SetThreadPriority
ReadConsoleA
AddAtomA
WriteConsoleOutputCharacterW
GetNumberFormatW
GetConsoleAliasExesA
GetBinaryTypeA
EnterCriticalSection
InitializeCriticalSection
GetCPInfoExW
LoadLibraryA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
RaiseException
GetStartupInfoA
IsBadReadPtr
DeleteCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetProcAddress
SetStdHandle
GetFileType
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetModuleHandleW
Sleep
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleFileNameA
GetStdHandle
SetHandleCount
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleW
GetConsoleOutputCP
MultiByteToWideChar
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
gdi32
GetBitmapBits
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 182KB - Virtual size: 736KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ