C:\zaxojofolubeke87_yizobajuko\18\jev-wuwod\dujex.pdb
Static task
static1
Behavioral task
behavioral1
Sample
afc14ac5145b194773b3ae0522b4df3e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
afc14ac5145b194773b3ae0522b4df3e.exe
Resource
win10v2004-20241007-en
General
-
Target
afc14ac5145b194773b3ae0522b4df3e
-
Size
278KB
-
MD5
afc14ac5145b194773b3ae0522b4df3e
-
SHA1
a0400fbb268c3cd6c516a5aadec05ce9d7fda785
-
SHA256
2ba67b8162e3730dd3bcd6d5eb2fbfe5477935b769da310eaa494e009d54c7da
-
SHA512
44cde5eb20fd107a7e2864a2f5a67e4f4e752ab4c0b1157ef5c9e39658d6be1ff8d98cbd74df7a0503b5e19eb07285eefbb8a8c17b0b0b6b67add5d72878b21e
-
SSDEEP
6144:o6DzZwAPif8ZkTXygfOnj15QgwEneG0yl8O/B:7/ZwB8eTXygfOnrQgwEeG0vqB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource afc14ac5145b194773b3ae0522b4df3e
Files
-
afc14ac5145b194773b3ae0522b4df3e.exe windows:5 windows x86 arch:x86
da8dc39195a81cc92b74bbfefe72b639
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetNamedPipeHandleStateW
CreateIoCompletionPort
FillConsoleOutputCharacterA
SetThreadAffinityMask
TerminateProcess
GetCurrentProcessId
GetVersionExA
EnumDateFormatsExW
FindNextFileW
CopyFileExA
BuildCommDCBAndTimeoutsW
DebugSetProcessKillOnExit
WriteProfileStringW
WritePrivateProfileStructA
FindFirstChangeNotificationA
MapViewOfFileEx
CreateTimerQueue
FindNextVolumeMountPointA
SetVolumeMountPointW
GetWriteWatch
ReadConsoleInputA
SetComputerNameExA
SystemTimeToTzSpecificLocalTime
GetSystemDirectoryA
GetDriveTypeA
BuildCommDCBAndTimeoutsA
LoadLibraryA
GlobalAlloc
VerifyVersionInfoW
GetBinaryTypeA
InterlockedExchange
InterlockedDecrement
FormatMessageW
SetDllDirectoryA
GetNamedPipeHandleStateA
WritePrivateProfileStringA
GetConsoleAliasesLengthW
GetProcessHeap
OpenWaitableTimerA
UnlockFile
InterlockedIncrement
GetStartupInfoW
GetSystemWow64DirectoryW
SetLastError
GetConsoleAliasExesW
ContinueDebugEvent
EndUpdateResourceA
GetLastError
FlushConsoleInputBuffer
SetDefaultCommConfigW
VirtualFree
InterlockedExchangeAdd
GlobalUnfix
GetSystemWindowsDirectoryA
CopyFileA
TerminateThread
GetOEMCP
FindAtomA
HeapUnlock
EnterCriticalSection
CreateActCtxA
GetConsoleAliasW
_lwrite
CreateNamedPipeA
SetSystemTimeAdjustment
DefineDosDeviceW
GetAtomNameA
SetConsoleScreenBufferSize
EnumResourceTypesA
lstrlenA
LoadLibraryW
WriteConsoleA
VirtualProtect
lstrcpyA
GetModuleHandleW
ReadConsoleOutputW
GetThreadContext
BuildCommDCBA
AddRefActCtx
GetStringTypeA
WritePrivateProfileStringW
GetDriveTypeW
GetFileAttributesW
OpenWaitableTimerW
GetVolumePathNameW
MoveFileW
GetCommMask
CloseHandle
LockFile
EnumDateFormatsExA
FindActCtxSectionStringA
GetNamedPipeInfo
AttachConsole
GlobalGetAtomNameW
SetComputerNameA
GetConsoleAliasesW
WriteConsoleInputW
CreateMailslotA
SetLocalTime
GetStringTypeExA
EnumSystemLocalesA
CallNamedPipeA
FindActCtxSectionStringW
GetPrivateProfileIntW
GetModuleHandleExW
GetConsoleAliasExesLengthW
GetTickCount
GetConsoleAliasesLengthA
GlobalWire
FillConsoleOutputCharacterW
GetCompressedFileSizeW
SetThreadPriority
MapUserPhysicalPages
WriteConsoleOutputCharacterA
EnumDateFormatsA
TerminateJobObject
CreateFileW
GetDateFormatA
GetMailslotInfo
FindNextVolumeA
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
DebugBreak
GetStdHandle
WriteFile
OutputDebugStringA
WriteConsoleW
GetFileType
OutputDebugStringW
ExitProcess
SetStdHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
FlushFileBuffers
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetACP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeW
GetLocaleInfoA
CreateFileA
advapi32
ImpersonateSelf
Sections
.text Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ