C:\zuyox.pdb
Static task
static1
Behavioral task
behavioral1
Sample
02c62354f252a4f53b1298e67a24cd6c388e690f762b7a2a4ce7efd4310c8a25N.exe
Resource
win7-20241010-en
General
-
Target
02c62354f252a4f53b1298e67a24cd6c388e690f762b7a2a4ce7efd4310c8a25N.exe
-
Size
371KB
-
MD5
c25ec9e423c0194118414fa485da8e60
-
SHA1
41c59ff6c03e6f7bd9b43504270e516319782a07
-
SHA256
02c62354f252a4f53b1298e67a24cd6c388e690f762b7a2a4ce7efd4310c8a25
-
SHA512
489549e3756be52794d8de1d93b4075d77f2dc4ff3acda27242e9085b3a141f26ffa639fa241857e36908097a34c08af9035137d478402dc24fab05cadd92ce4
-
SSDEEP
6144:/5UZyZf6NhvOHD/jhkypgUwxMYwPzK8SEt:RUol6NhADLH/U1czlSO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 02c62354f252a4f53b1298e67a24cd6c388e690f762b7a2a4ce7efd4310c8a25N.exe
Files
-
02c62354f252a4f53b1298e67a24cd6c388e690f762b7a2a4ce7efd4310c8a25N.exe.exe windows:5 windows x86 arch:x86
0f907acfe861920cd55775c62f670cb2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
AddConsoleAliasW
GetComputerNameW
GetModuleHandleW
GetNumberFormatA
ReadConsoleW
EnumTimeFormatsA
EnumResourceTypesA
SetProcessPriorityBoost
ActivateActCtx
GetCalendarInfoA
GetSystemWindowsDirectoryA
HeapCreate
EnumSystemCodePagesA
FindNextVolumeW
GetConsoleAliasW
Beep
GetModuleFileNameW
GetConsoleFontSize
CreateActCtxA
GetACP
lstrlenW
GlobalUnlock
EnumSystemLocalesA
SetLastError
GetProcAddress
GetLongPathNameA
VirtualAlloc
HeapSize
IsBadHugeWritePtr
SetComputerNameW
WriteProfileSectionA
RemoveDirectoryA
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
QueryDosDeviceW
WriteProfileSectionW
AddAtomA
GetDefaultCommConfigA
SetConsoleCursorInfo
GetConsoleTitleW
GetShortPathNameW
GetCPInfoExA
GetDiskFreeSpaceExW
FindAtomW
GetWindowsDirectoryW
DeleteTimerQueueTimer
GetTempPathA
EnumCalendarInfoExA
SuspendThread
CreateFileA
CloseHandle
WriteConsoleW
GetConsoleOutputCP
SetStdHandle
FlushFileBuffers
GetModuleHandleA
WaitForSingleObject
GetCurrentActCtx
ReadConsoleA
lstrlenA
FindResourceExW
BeginUpdateResourceW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
ExitProcess
GetCPInfo
GetOEMCP
IsValidCodePage
SetHandleCount
GetStdHandle
GetFileType
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
SetFilePointer
GetConsoleCP
GetConsoleMode
user32
ToAsciiEx
ChangeMenuA
CharLowerBuffW
SetParent
CreateAcceleratorTableW
GetWindowLongA
GetSysColorBrush
GetKeyNameTextW
GetMenuInfo
gdi32
GetCharWidthA
GetColorAdjustment
GetCharABCWidthsW
advapi32
BackupEventLogW
Sections
.text Size: 206KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ