C:\zovugipetig_raducebod_xut\heguseluduxu-yowatucujube.pdb
Static task
static1
Behavioral task
behavioral1
Sample
67263aa06e8a581f9b1cde9f7d08fd7784268fa5a7d67d98943ead51e9574ef3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
67263aa06e8a581f9b1cde9f7d08fd7784268fa5a7d67d98943ead51e9574ef3.exe
Resource
win10v2004-20241007-en
General
-
Target
67263aa06e8a581f9b1cde9f7d08fd7784268fa5a7d67d98943ead51e9574ef3
-
Size
433KB
-
MD5
a4b07d1d6d336586d3b63c612f3ec361
-
SHA1
0c05b7586f5dbf82941abe324ee77320ad6a3d0b
-
SHA256
67263aa06e8a581f9b1cde9f7d08fd7784268fa5a7d67d98943ead51e9574ef3
-
SHA512
038bb06c0572d9d58205ed27d5ac4836460ce2f68d1f883067c0cb867b876c323565e69bfb7926c17d0e25f0945d65cd8feea9a57d5b8c17e28c1072b2a43d17
-
SSDEEP
6144:pOR5Bk9cF45s5zJtXXYLE/32/bW7JF3qpDLUwznoFid:c/B4H5WJqLE/6W773qpEwzno4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67263aa06e8a581f9b1cde9f7d08fd7784268fa5a7d67d98943ead51e9574ef3
Files
-
67263aa06e8a581f9b1cde9f7d08fd7784268fa5a7d67d98943ead51e9574ef3.exe windows:5 windows x86 arch:x86
9b5e0e93b958d7de96d2eb171562e213
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstVolumeW
WaitForSingleObject
GetNamedPipeHandleStateW
CreateNamedPipeA
CallNamedPipeW
TerminateProcess
FatalExit
GetVersionExA
CopyFileExW
SetConsoleCP
VerifyVersionInfoA
VerLanguageNameW
FindFirstFileExW
FreeEnvironmentStringsW
SetProcessPriorityBoost
SetVolumeMountPointA
GetLongPathNameW
CopyFileA
TlsGetValue
VerifyVersionInfoW
GetConsoleCursorInfo
SystemTimeToTzSpecificLocalTime
GetProcessShutdownParameters
MultiByteToWideChar
GetNamedPipeHandleStateA
BuildCommDCBAndTimeoutsW
GetProcAddress
GetModuleHandleA
GlobalAlloc
Sleep
MoveFileW
GetCommandLineA
InterlockedDecrement
DeleteFileA
GetVolumePathNamesForVolumeNameW
GetPrivateProfileStringA
GetPrivateProfileIntW
HeapSize
GetProcessHeap
CreateNamedPipeW
SetFileShortNameA
GetStartupInfoW
GetEnvironmentVariableA
GetCPInfoExA
GetWindowsDirectoryA
GetSystemWow64DirectoryA
GetProfileStringW
GetCalendarInfoW
SetLastError
GetExitCodeThread
DebugBreak
FindFirstFileW
ReadFileScatter
ReadFile
SetDefaultCommConfigA
GetNumberOfConsoleMouseButtons
GlobalWire
WritePrivateProfileSectionW
WriteProfileStringA
lstrcatW
FindCloseChangeNotification
CreateActCtxW
InterlockedPopEntrySList
InterlockedExchange
SetConsoleTitleW
DefineDosDeviceA
LoadLibraryA
WritePrivateProfileStringW
WaitNamedPipeW
SetSystemTimeAdjustment
GetConsoleMode
UnregisterWaitEx
PeekConsoleInputA
GetNumberFormatA
FindResourceExA
FindNextFileW
FindFirstFileA
FreeEnvironmentStringsA
CreateSemaphoreW
EnumTimeFormatsA
SetLocalTime
OutputDebugStringW
lstrcpyA
HeapWalk
CreateHardLinkW
RaiseException
SetSystemTime
LockFile
EnumCalendarInfoExW
MoveFileExA
GetConsoleCP
SetConsoleScreenBufferSize
SearchPathW
IsBadStringPtrA
GetAtomNameA
GetConsoleAliasExesLengthW
WriteConsoleInputW
LocalLock
EnumDateFormatsW
SetCommState
GetSystemTimeAdjustment
EnumSystemLocalesA
GetNumaHighestNodeNumber
SetEndOfFile
GetWriteWatch
SetUnhandledExceptionFilter
OpenSemaphoreA
GetLargestConsoleWindowSize
ReleaseActCtx
GetComputerNameA
HeapValidate
GetLastError
OpenMutexW
GetStringTypeA
SetSystemPowerState
FindResourceW
SetTimerQueueTimer
EnumResourceNamesA
GetProcessTimes
RegisterWaitForSingleObject
IsBadWritePtr
GetCurrentProcessId
FatalAppExitA
GetFileAttributesW
lstrcpynW
DisconnectNamedPipe
FillConsoleOutputCharacterA
GetCompressedFileSizeA
SetFileShortNameW
GetFullPathNameA
WriteProfileStringW
SetInformationJobObject
GlobalAddAtomA
SetCurrentDirectoryA
CreateTimerQueueTimer
LeaveCriticalSection
CloseHandle
CreateFileW
GetCommandLineW
HeapSetInformation
EncodePointer
IsProcessorFeaturePresent
IsBadReadPtr
InterlockedIncrement
DecodePointer
GetModuleHandleW
ExitProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
WriteFile
GetStdHandle
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
HeapCreate
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
EnterCriticalSection
HeapAlloc
GetModuleFileNameA
HeapReAlloc
HeapQueryInformation
HeapFree
LoadLibraryW
RtlUnwind
WideCharToMultiByte
LCMapStringW
GetStringTypeW
OutputDebugStringA
WriteConsoleW
SetFilePointer
SetStdHandle
FlushFileBuffers
user32
GetMenuItemID
Sections
.text Size: 339KB - Virtual size: 338KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 54KB - Virtual size: 558KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ