C:\bikapano-32\jebeno\segu_43 puwi\rudoxixafelira67\y.pdb
Static task
static1
Behavioral task
behavioral1
Sample
143c20b4679aa2897cf35096c03cad30a40a6c2b0877dd6b85feb370c5d9706a.exe
Resource
win7-20240729-en
General
-
Target
143c20b4679aa2897cf35096c03cad30a40a6c2b0877dd6b85feb370c5d9706a.exe
-
Size
300KB
-
MD5
df0c37da33fa863cc3b3712c930eea18
-
SHA1
ddd5959391d71f228d8a46b3685e645fca6b74b8
-
SHA256
143c20b4679aa2897cf35096c03cad30a40a6c2b0877dd6b85feb370c5d9706a
-
SHA512
09c8a1c3ee161e00bb60208504018782d0e4b9ac596f18fb39ad63d7edac2e761b64b74378c9d40ad40803458f1255f18b381bc7741880d2ac07d991117c4d0b
-
SSDEEP
6144:nGkj8Lfts0eW2JuHJ51+XvZZNEOa0LS7j:vj8zts9RJkwXxLEOAj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 143c20b4679aa2897cf35096c03cad30a40a6c2b0877dd6b85feb370c5d9706a.exe
Files
-
143c20b4679aa2897cf35096c03cad30a40a6c2b0877dd6b85feb370c5d9706a.exe.exe windows:5 windows x86 arch:x86
21829bcb83e2224c2104cf7cefe96c53
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GlobalSize
SetDefaultCommConfigW
CreateHardLinkA
WaitForSingleObjectEx
FreeEnvironmentStringsA
EnumCalendarInfoExW
GetConsoleTitleA
ReadConsoleW
GetCompressedFileSizeW
WaitNamedPipeW
CreateActCtxW
SetHandleCount
TlsSetValue
LoadLibraryW
GetConsoleMode
InterlockedPopEntrySList
FindNextVolumeW
GetFileAttributesW
WriteConsoleW
IsBadStringPtrA
WritePrivateProfileStringW
GetStringTypeExA
GetConsoleAliasesW
GetCommState
ChangeTimerQueueTimer
SetLastError
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
CreateMemoryResourceNotification
SearchPathA
LoadLibraryA
LocalAlloc
DnsHostnameToComputerNameA
AddAtomW
GetProfileStringA
BeginUpdateResourceA
WriteProfileSectionW
FoldStringW
EnumResourceTypesW
GetModuleFileNameA
GetModuleHandleA
GetCommTimeouts
QueryPerformanceFrequency
DeleteFileW
DebugBreak
ReadConsoleOutputCharacterW
GetConsoleAliasExesLengthA
FindResourceExW
GetNumaProcessorNode
VirtualQuery
GetStdHandle
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
GetModuleHandleW
ExitProcess
WriteFile
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
FlushFileBuffers
CreateFileA
CloseHandle
gdi32
GetCharABCWidthsW
CreateDiscardableBitmap
GetCharWidthI
advapi32
GetEventLogInformation
Sections
.text Size: 234KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ