C:\cexod88\yu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b7709d83ab0ca1c18cb79fee4b47c03c1ea4fddf85ad0ad93f742d4953bb64e3N.exe
Resource
win7-20241010-en
General
-
Target
b7709d83ab0ca1c18cb79fee4b47c03c1ea4fddf85ad0ad93f742d4953bb64e3N.exe
-
Size
236KB
-
MD5
b371b1f6c93f59ccf74c78df410ee280
-
SHA1
0060b4af40874b34825d6fcc6ef17ae77bce0fed
-
SHA256
b7709d83ab0ca1c18cb79fee4b47c03c1ea4fddf85ad0ad93f742d4953bb64e3
-
SHA512
7b68417ac8251165b1c767f02efb6815ca0a2650a99f9b03daf21b1e7520ca05c0b0b210f82c04b45905688960bde9b99b31b89d56fdd17c7cc9261ad1a65647
-
SSDEEP
6144:54qYRDKdnF/BhH8W5BLSofVhov5U802hAVcB:5tYRudnF/3VDohUGhGc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7709d83ab0ca1c18cb79fee4b47c03c1ea4fddf85ad0ad93f742d4953bb64e3N.exe
Files
-
b7709d83ab0ca1c18cb79fee4b47c03c1ea4fddf85ad0ad93f742d4953bb64e3N.exe.exe windows:5 windows x86 arch:x86
bb60398211b18fadc0393d4c1e0d3fbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateJobObjectW
InterlockedCompareExchange
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
ReadConsoleW
WaitNamedPipeW
SetHandleCount
TlsSetValue
FindResourceExA
WideCharToMultiByte
LoadLibraryW
GetVersionExW
DeleteVolumeMountPointW
GetStringTypeExW
SetConsoleMode
HeapValidate
SetConsoleCursorPosition
GetMailslotInfo
GetModuleFileNameW
SetLastError
BackupRead
GetNumberOfConsoleMouseButtons
VirtualAlloc
SetStdHandle
LoadLibraryA
LocalAlloc
WritePrivateProfileStringA
AddAtomW
OpenEventA
BeginUpdateResourceA
WriteProfileSectionW
FoldStringW
EnumResourceTypesW
GetModuleHandleA
QueryPerformanceFrequency
GetCPInfoExA
GetVersionExA
GetWindowsDirectoryW
AddConsoleAliasA
DebugBreak
EnumCalendarInfoExA
InterlockedPushEntrySList
DeleteFileA
GetCommState
MoveFileExW
VerSetConditionMask
CommConfigDialogA
InterlockedIncrement
GetProcAddress
GetSystemDefaultLangID
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
GetFileType
SetFilePointer
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
CreateFileA
CloseHandle
gdi32
GetCharacterPlacementA
SelectPalette
GetTextExtentExPointW
GetCharWidthI
advapi32
MapGenericMask
GetEventLogInformation
Sections
.text Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 443KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ