C:\nehazinad\bapibowe_sebuvozarob\fem_nizokececito\yocaz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
65784aff2a28ace660e7ffa693ccad1708779f5206767007c21d8bc450113508.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
65784aff2a28ace660e7ffa693ccad1708779f5206767007c21d8bc450113508.exe
Resource
win10v2004-20241007-en
General
-
Target
65784aff2a28ace660e7ffa693ccad1708779f5206767007c21d8bc450113508.exe
-
Size
233KB
-
MD5
11690f9983d67043d4337ebae84dc3f6
-
SHA1
dce1933a6ee4a306383cb6424b13018978de313c
-
SHA256
65784aff2a28ace660e7ffa693ccad1708779f5206767007c21d8bc450113508
-
SHA512
63edc919b72ac8aa46bfbdd228b8aa5c2bca1c1abc993b24a43ff09a009ba16432f951282e29395f74384606ec897823117fbb0b0cd4afa97fc423a69a1d9d1e
-
SSDEEP
3072:RGB6tEhjUnUUlq1Qwfu6Lsw71Pxlr1iPNTFgz+CNf4/AWaSkSJu98vdi:ehjUnUUeQwJAqBL1iPNT+TIADG8eli
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 65784aff2a28ace660e7ffa693ccad1708779f5206767007c21d8bc450113508.exe
Files
-
65784aff2a28ace660e7ffa693ccad1708779f5206767007c21d8bc450113508.exe.exe windows:5 windows x86 arch:x86
324eb7eba0d6f4cd042276a6e19d7718
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetEnvironmentStringsW
ReadConsoleW
FindActCtxSectionStringA
CreateActCtxW
GlobalAlloc
Sleep
InitAtomTable
HeapCreate
FindNextVolumeW
GetAtomNameW
GetMailslotInfo
GetModuleFileNameW
SetConsoleTitleA
SetTapePosition
SetLastError
GetProcAddress
VirtualAlloc
ResetEvent
LoadLibraryA
WriteConsoleA
BeginUpdateResourceA
SetEnvironmentVariableA
GetModuleFileNameA
GetProcessShutdownParameters
GetProcessAffinityMask
GetCPInfoExA
Module32Next
ReleaseMutex
EndUpdateResourceA
GetVersionExA
FindNextVolumeA
lstrcpyW
HeapReAlloc
EncodePointer
DecodePointer
GetModuleHandleW
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapAlloc
ReadFile
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
LoadLibraryW
WriteFile
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
RtlUnwind
RaiseException
SetStdHandle
FlushFileBuffers
LCMapStringW
GetStringTypeW
HeapSize
WriteConsoleW
CreateFileW
gdi32
GetBitmapBits
winhttp
WinHttpSetOption
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 42.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fowe Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ