C:\xonubuwer\velazodamus44.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d526932ab62660d8516b6fb2938b68e04addbf2a55f00bd31d52b580ea42a623.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d526932ab62660d8516b6fb2938b68e04addbf2a55f00bd31d52b580ea42a623.exe
Resource
win10v2004-20241007-en
General
-
Target
d526932ab62660d8516b6fb2938b68e04addbf2a55f00bd31d52b580ea42a623
-
Size
275KB
-
MD5
13f497089b5f6e758821a269c0112bd3
-
SHA1
f1cf420b80c3eb2079f207593c904d5a9c530055
-
SHA256
d526932ab62660d8516b6fb2938b68e04addbf2a55f00bd31d52b580ea42a623
-
SHA512
53eaf3958916a4bdfa92e5daff7c7548cd90b5cb26b1d8c8c6d1c2e6bc79bbe9c5ea920c862341aaefecca58a721a01beb8866b8e8c1973160ba45a075209f45
-
SSDEEP
6144:v5+2030VmxUCIp98zz+3PHoNlDfdZzIdeoY:vg2RV4/Ip98fMoNXZzI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d526932ab62660d8516b6fb2938b68e04addbf2a55f00bd31d52b580ea42a623
Files
-
d526932ab62660d8516b6fb2938b68e04addbf2a55f00bd31d52b580ea42a623.exe windows:5 windows x86 arch:x86
29a3e1bfcba90bd8a9d07c84b2950c7c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateTimerQueue
GetFileSize
SetThreadContext
GetConsoleAliasesLengthW
CopyFileExW
GetModuleHandleExA
GetConsoleAliasExesA
SetComputerNameExA
GetDriveTypeW
MoveFileExA
DebugActiveProcessStop
lstrcpynA
GetConsoleAliasExesLengthA
FindResourceW
BuildCommDCBAndTimeoutsA
LoadResource
InterlockedIncrement
_lwrite
GetQueuedCompletionStatus
VerSetConditionMask
ReadConsoleA
InterlockedDecrement
GetCurrentActCtx
SetDefaultCommConfigW
GetSystemWindowsDirectoryW
SetConsoleScreenBufferSize
InterlockedCompareExchange
WriteConsoleInputA
GetComputerNameW
GetLogicalDrives
CallNamedPipeW
FreeEnvironmentStringsA
GetProcessPriorityBoost
GetTickCount
GetDllDirectoryW
GetPrivateProfileStringW
GetConsoleTitleA
ReadConsoleOutputA
GetDateFormatA
GetCommandLineA
CreateActCtxW
EnumResourceTypesA
GetPriorityClass
GetPrivateProfileIntA
GetSystemDirectoryW
AddRefActCtx
CopyFileW
AssignProcessToJobObject
GetCalendarInfoA
ReadProcessMemory
GetSystemWow64DirectoryW
FormatMessageW
GetSystemTimeAdjustment
GetVersionExW
GetFileAttributesA
WritePrivateProfileStructW
GetConsoleAliasW
GetWriteWatch
GetBinaryTypeA
TerminateProcess
GetAtomNameW
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
CreateFileW
GetOverlappedResult
GetACP
lstrcmpW
GetVolumePathNameA
lstrlenW
FindNextVolumeMountPointW
CreateMailslotW
DisconnectNamedPipe
GetNamedPipeHandleStateW
GlobalUnfix
ReleaseActCtx
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetHandleInformation
GetLastError
GetLongPathNameW
ReadConsoleOutputCharacterA
CreateNamedPipeA
EnumDateFormatsExA
WriteProfileSectionA
SetComputerNameA
DisableThreadLibraryCalls
DefineDosDeviceA
ResetEvent
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
WriteConsoleA
ProcessIdToSessionId
UnhandledExceptionFilter
InterlockedExchangeAdd
LocalAlloc
SetCalendarInfoW
WritePrivateProfileStringA
MoveFileA
SetConsoleOutputCP
GetExitCodeThread
SetCurrentDirectoryW
HeapLock
GetTapeParameters
FoldStringA
SetSystemTime
GlobalWire
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
FindFirstChangeNotificationA
lstrcatW
GetStringTypeW
BuildCommDCBA
VirtualProtect
OutputDebugStringA
SetThreadAffinityMask
EndUpdateResourceA
CloseHandle
DeleteFileW
GetCurrentProcessId
CreateWaitableTimerA
DebugBreak
FindActCtxSectionStringW
GetProfileSectionW
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
WideCharToMultiByte
GetStartupInfoW
GetModuleFileNameW
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
GetModuleHandleW
GetProcAddress
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
GetCurrentProcess
IsDebuggerPresent
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
WriteConsoleW
OutputDebugStringW
LoadLibraryW
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
SetFilePointer
SetStdHandle
GetConsoleOutputCP
CreateFileA
DeleteFileA
Sections
.text Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ