C:\xejorigoh\zejaguk\weyoguf.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c5d080e3ffc6029dd77e1e61ea9f7bbbcc7c335becc48326ee23ebd2782c9f4a.exe
Resource
win7-20240903-en
General
-
Target
c5d080e3ffc6029dd77e1e61ea9f7bbbcc7c335becc48326ee23ebd2782c9f4a
-
Size
395KB
-
MD5
174f5e167da35b8d66fb9532069c8255
-
SHA1
0543f3522e61ed50213c9a69a887226b09609940
-
SHA256
c5d080e3ffc6029dd77e1e61ea9f7bbbcc7c335becc48326ee23ebd2782c9f4a
-
SHA512
bf9da68a060d12a9729b47c629c9e9a84b0a9b2f2bacb6e14799424803f035f11a1807e0fd5f517de98e8043771e12ae663cca1fb71d49948985db8c4f25c122
-
SSDEEP
6144:S8J7ui3GtK/v/Ypw1G0uuYx+uu+OGI1XwYpqqWXgi474+agTDmm4CFyQ:XC0GY/vKw1JFvrGqfpqqWXgPNbfwQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c5d080e3ffc6029dd77e1e61ea9f7bbbcc7c335becc48326ee23ebd2782c9f4a
Files
-
c5d080e3ffc6029dd77e1e61ea9f7bbbcc7c335becc48326ee23ebd2782c9f4a.exe windows:5 windows x86 arch:x86
a15b9be1231244cf8663da535afe20ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCommandLineW
FileTimeToDosDateTime
EnumResourceNamesW
GetNativeSystemInfo
CopyFileExW
SetLocalTime
GetCPInfo
GetConsoleAliasExesLengthA
HeapAlloc
SetDllDirectoryW
InterlockedIncrement
GetCommState
ReadConsoleA
InterlockedDecrement
GlobalSize
GetSystemWindowsDirectoryW
GlobalLock
GetProfileSectionA
GetModuleHandleW
GetTickCount
GetPrivateProfileStringW
TlsSetValue
ActivateActCtx
GlobalAlloc
LoadLibraryW
TerminateThread
GetCompressedFileSizeA
CompareStringW
lstrlenW
SetThreadPriority
DeactivateActCtx
GetNamedPipeHandleStateW
LCMapStringA
GetPrivateProfileIntW
VerifyVersionInfoW
CreateDirectoryA
InterlockedExchange
SetCurrentDirectoryA
GetStartupInfoA
GetStdHandle
GetLastError
GetThreadLocale
ReadConsoleOutputCharacterA
GetProcAddress
EnterCriticalSection
CreateMemoryResourceNotification
DisableThreadLibraryCalls
Process32FirstW
WritePrivateProfileStringA
HeapWalk
FindAtomA
SetSystemTime
SetEnvironmentVariableA
FindNextFileA
WriteProfileStringA
FindFirstChangeNotificationA
FreeEnvironmentStringsW
EnumResourceNamesA
GetStringTypeW
WriteProfileStringW
GetCurrentThreadId
GetCPInfoExA
UnregisterWaitEx
TlsFree
GetVolumeInformationW
FlushFileBuffers
CloseHandle
MultiByteToWideChar
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
DeleteCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
SetLastError
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
ExitProcess
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapSize
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
CreateFileA
user32
GetMenuItemID
winhttp
WinHttpCloseHandle
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 142KB - Virtual size: 19.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ