C:\xobuwacevus gucaxiwivor\89\jebize.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d19b38752f3722bf718024ef181e078fd068aa6ffe2a3f280a750aa47034fa54.exe
Resource
win7-20240903-en
General
-
Target
d19b38752f3722bf718024ef181e078fd068aa6ffe2a3f280a750aa47034fa54.exe
-
Size
237KB
-
MD5
b3f49857f55eec50fd6a063efcab090b
-
SHA1
a86901f8cb8e46d3fd81c8bca201e1e705a14259
-
SHA256
d19b38752f3722bf718024ef181e078fd068aa6ffe2a3f280a750aa47034fa54
-
SHA512
ec2f092d530df3e882ef328ba4b679f37d6907dcd80e10958cabf5b505bc8dabc4157d8d95f7d6289ae822e12bcc5a8301893377f1d1220bff33907175b2ea14
-
SSDEEP
3072:Z70Bu4ZmbbeIFqGJByXcsq5nV6slHvXVXgqPTsBHglBUVs6sL3+zWJiRS5/FuP+K:GMWGzyssq5ntBtgbBHgHUXzGFE+K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d19b38752f3722bf718024ef181e078fd068aa6ffe2a3f280a750aa47034fa54.exe
Files
-
d19b38752f3722bf718024ef181e078fd068aa6ffe2a3f280a750aa47034fa54.exe.exe windows:5 windows x86 arch:x86
93af49a7eb518a2e0b7bbbb909dbb2f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateJobObjectW
GetModuleHandleW
GetConsoleAliasesLengthA
ReadConsoleW
WaitNamedPipeW
SetHandleCount
TlsSetValue
WideCharToMultiByte
LoadLibraryW
GetVersionExW
GetStringTypeExW
SetConsoleMode
HeapValidate
SetConsoleCursorPosition
GetMailslotInfo
WritePrivateProfileStringW
GetCPInfoExW
SetLastError
BackupRead
GetProcAddress
GetCommState
BeginUpdateResourceW
SetStdHandle
InterlockedExchangeAdd
LocalAlloc
AddAtomW
OpenEventA
WriteProfileSectionW
FoldStringA
EnumResourceTypesW
GetModuleFileNameA
FreeEnvironmentStringsW
QueryPerformanceFrequency
GetVersionExA
GetWindowsDirectoryW
AddConsoleAliasA
GetConsoleProcessList
DebugBreak
EnumCalendarInfoExA
InterlockedPushEntrySList
CommConfigDialogW
DeleteFileA
MoveFileExW
VerSetConditionMask
InterlockedIncrement
FindResourceExW
DeleteVolumeMountPointA
VirtualAlloc
GetSystemDefaultLangID
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
GetLastError
HeapFree
RtlUnwind
RaiseException
ExitProcess
WriteFile
GetStdHandle
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
GetFileType
SetFilePointer
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
CreateFileA
CloseHandle
gdi32
GetCharacterPlacementA
SelectPalette
GetTextExtentExPointW
GetCharWidthI
advapi32
MapGenericMask
GetEventLogInformation
ole32
OleQueryLinkFromData
Sections
.text Size: 189KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 444KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ