C:\xazid.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d9b19d38b4d2332a6ee9e22dcf34c3d11d57d1f385d9093a0fbd726bd4cda3f3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d9b19d38b4d2332a6ee9e22dcf34c3d11d57d1f385d9093a0fbd726bd4cda3f3.exe
Resource
win10v2004-20241007-en
General
-
Target
d9b19d38b4d2332a6ee9e22dcf34c3d11d57d1f385d9093a0fbd726bd4cda3f3.exe
-
Size
232KB
-
MD5
f8a63fc2a1f560a84ccfc6f81f29e2d0
-
SHA1
96aa4c63b59f096c58e537b0d14882218870a75b
-
SHA256
d9b19d38b4d2332a6ee9e22dcf34c3d11d57d1f385d9093a0fbd726bd4cda3f3
-
SHA512
7062735ae5db9cd5053832ddd9690865448161b83a9e1d1b21835c64e5e3e3376a43788309e3c11870631b2dccde7ea36962ddc477050b2e0fd4851ba7befacc
-
SSDEEP
3072:YGB6tEhjUnUUWUaUI4gu04jgo5lr7ia+edhLeb+CNf4/AWaSkSJu98vdh:DhjUnUURaQ04jZD7iOq7IADG8elh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d9b19d38b4d2332a6ee9e22dcf34c3d11d57d1f385d9093a0fbd726bd4cda3f3.exe
Files
-
d9b19d38b4d2332a6ee9e22dcf34c3d11d57d1f385d9093a0fbd726bd4cda3f3.exe.exe windows:5 windows x86 arch:x86
324eb7eba0d6f4cd042276a6e19d7718
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetEnvironmentStringsW
ReadConsoleW
FindActCtxSectionStringA
CreateActCtxW
GlobalAlloc
Sleep
InitAtomTable
HeapCreate
FindNextVolumeW
GetAtomNameW
GetMailslotInfo
GetModuleFileNameW
SetConsoleTitleA
SetTapePosition
SetLastError
GetProcAddress
VirtualAlloc
ResetEvent
LoadLibraryA
WriteConsoleA
BeginUpdateResourceA
SetEnvironmentVariableA
GetModuleFileNameA
GetProcessShutdownParameters
GetProcessAffinityMask
GetCPInfoExA
Module32Next
ReleaseMutex
EndUpdateResourceA
GetVersionExA
FindNextVolumeA
lstrcpyW
HeapReAlloc
EncodePointer
DecodePointer
GetModuleHandleW
ExitProcess
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapAlloc
ReadFile
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
LoadLibraryW
WriteFile
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
RtlUnwind
RaiseException
SetStdHandle
FlushFileBuffers
LCMapStringW
GetStringTypeW
HeapSize
WriteConsoleW
CreateFileW
gdi32
GetBitmapBits
winhttp
WinHttpSetOption
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 42.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zutudo Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ