C:\lif\bixovohiceni-yunemecatadepo98\sevot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e06488a6a94ee095c638733585e784c317da0ee9467b724ba7ca2b6f050ed861N.exe
Resource
win7-20240903-en
General
-
Target
e06488a6a94ee095c638733585e784c317da0ee9467b724ba7ca2b6f050ed861N.exe
-
Size
333KB
-
MD5
94bab401649ea0fafddc65311435c950
-
SHA1
bde7ff8a732eef7a9409ba72476e2eeb6facd79f
-
SHA256
e06488a6a94ee095c638733585e784c317da0ee9467b724ba7ca2b6f050ed861
-
SHA512
3017dc7eddf4443f4ed86d2a2d40ef988850ae2bd39987297f95652a28a250ee0a175bcadb5f5120f7ad0199e36f5d3908be7d09bb38be8af169a10139607667
-
SSDEEP
6144:HoxwfScPvHgoXWbmrh1q9+EOFCLdNaD/1g:Huwf1fgyWmgoDwLdNA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e06488a6a94ee095c638733585e784c317da0ee9467b724ba7ca2b6f050ed861N.exe
Files
-
e06488a6a94ee095c638733585e784c317da0ee9467b724ba7ca2b6f050ed861N.exe.exe windows:5 windows x86 arch:x86
ac5563f259b76cfa24f9c5fb695402f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
SetComputerNameW
AddConsoleAliasW
GetComputerNameW
_lclose
GetModuleHandleW
EnumCalendarInfoExW
GetConsoleAliasesA
GetNumberFormatA
GetConsoleTitleA
ReadConsoleW
GetWindowsDirectoryA
GetConsoleAliasExesW
EnumTimeFormatsW
CreateActCtxW
SetProcessPriorityBoost
FindResourceExA
GetCalendarInfoA
GetSystemWindowsDirectoryA
FindNextVolumeW
Beep
WriteConsoleW
GetModuleFileNameW
GetConsoleFontSize
lstrlenW
WritePrivateProfileStringW
GlobalUnlock
GetShortPathNameA
GetCPInfoExW
GetLastError
SetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
GetConsoleAliasA
IsBadHugeWritePtr
BeginUpdateResourceW
EnumSystemCodePagesW
_hwrite
SetThreadPriorityBoost
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
AddAtomW
RemoveDirectoryW
QueryDosDeviceW
WriteProfileSectionW
EnumResourceTypesW
GetOEMCP
GetDefaultCommConfigA
SetConsoleCursorInfo
GetConsoleTitleW
VirtualProtect
GetDiskFreeSpaceExW
FindAtomW
WriteFileEx
DeleteTimerQueueTimer
SuspendThread
GetModuleHandleA
GetLocaleInfoA
SystemTimeToFileTime
FindResourceA
lstrlenA
HeapSize
EnumResourceNamesW
HeapAlloc
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
ToAsciiEx
GetKeyNameTextA
ChangeMenuA
CreateAcceleratorTableW
GetWindowLongW
GetSysColorBrush
SetCaretPos
ModifyMenuA
IsCharAlphaNumericA
CharLowerBuffW
gdi32
CreateHalftonePalette
GetCharABCWidthsW
GetCharWidthW
advapi32
BackupEventLogA
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ