C:\hujaweyinizaho61\leburi.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0.exe
Resource
win10v2004-20241007-en
General
-
Target
d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0.exe
-
Size
438KB
-
MD5
9bc7da2116e5320389cca70b696501f4
-
SHA1
37a5a16b1c4d54ee079be03d8b8974c6c0a98808
-
SHA256
d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0
-
SHA512
93151142d1e4442e20c4f20d762478239ab65e21e5b5c0081e2e3f1af3adc9bc8fc224dd724ed6ce669399955c015c5803686a3403f614a01b238bffb60d11e0
-
SSDEEP
6144:KYUIFJk4W+kXGEyp4+in0IoQTIsqs1r1LXsDvHCW9b5vgi5rJ6dXlVS9ONgQsFvg:kKkXGEy8sQx1rF0iC5vrlW6OdsVD0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0.exe
Files
-
d6af6740325543d68e35ac6293b7b5828cebb3f54e940735439b7d347526e9b0.exe.exe windows:5 windows x86 arch:x86
ab6a1f3e3b2e868d2b29ae16c796885b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
QueryPerformanceCounter
FindCloseChangeNotification
BackupSeek
FreeEnvironmentStringsA
GetModuleHandleW
EnumCalendarInfoExW
VirtualFree
ConvertFiberToThread
ReadConsoleW
EnumTimeFormatsA
EnumResourceTypesA
SetHandleCount
LoadLibraryW
SetCommConfig
GetConsoleWindow
GetFileAttributesW
EnumSystemLocalesA
InterlockedExchange
GetProfileIntA
GetCPInfoExW
FillConsoleOutputCharacterW
GetLastError
InterlockedDecrement
GetProcAddress
AttachConsole
VirtualAlloc
HeapSize
BeginUpdateResourceW
WriteProfileSectionA
LoadLibraryA
LocalAlloc
OpenEventA
RemoveDirectoryW
PostQueuedCompletionStatus
FoldStringA
EnumDateFormatsA
GetModuleHandleA
HeapSetInformation
VirtualProtect
ScrollConsoleScreenBufferA
GetShortPathNameW
GetWindowsDirectoryW
AddConsoleAliasA
DebugBreak
GetSystemDefaultUILanguage
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetStdHandle
GetFileType
DeleteCriticalSection
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
WriteFile
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
CloseHandle
CreateFileA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
SetFilePointer
SetEndOfFile
GetProcessHeap
MultiByteToWideChar
ReadFile
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
gdi32
GetCharWidthA
GetCharWidthI
Sections
.text Size: 392KB - Virtual size: 391KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ