C:\tovesudu\vorod.pdb
Static task
static1
Behavioral task
behavioral1
Sample
22e71b69996720a2085ba81afa754ddd93924bfe9e32e6bc126a51266432416e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
22e71b69996720a2085ba81afa754ddd93924bfe9e32e6bc126a51266432416e.exe
Resource
win10v2004-20241007-en
General
-
Target
22e71b69996720a2085ba81afa754ddd93924bfe9e32e6bc126a51266432416e
-
Size
293KB
-
MD5
51e884b7c9b3ade80282f3f3e962ebf7
-
SHA1
993edd55294643356730836506dcd06ed80078c4
-
SHA256
22e71b69996720a2085ba81afa754ddd93924bfe9e32e6bc126a51266432416e
-
SHA512
c1cae26916b9c2a6ac171fe87b4e6c637d7df5892c1445371cf94ff3cefba3a7370bbd4716b09650bbf61944b577096c3c4eead3950f4f515e24655bd6961a0f
-
SSDEEP
3072:swM0t9Jk/DB+lyKFA0jZOTRDr3O//AznysxkgaBChUpZa9uD6Vdyhk:x9q/DB+lyhKmR2nGviga3wVf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 22e71b69996720a2085ba81afa754ddd93924bfe9e32e6bc126a51266432416e
Files
-
22e71b69996720a2085ba81afa754ddd93924bfe9e32e6bc126a51266432416e.exe windows:5 windows x86 arch:x86
a8456671b95a4485dcd9277ddaf595e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CommConfigDialogA
FindResourceW
FreeLibrary
GetCurrentProcess
GetEnvironmentStringsW
GetModuleHandleW
GlobalAlloc
GetSystemDirectoryW
LoadLibraryW
CreateEventA
SetConsoleMode
GetBinaryTypeA
GetModuleFileNameW
InterlockedExchange
GetConsoleAliasesLengthW
SetLastError
GetProcAddress
MoveFileW
GetDiskFreeSpaceW
LoadLibraryA
GetProcessWorkingSetSize
TransmitCommChar
OpenJobObjectW
EnumCalendarInfoExA
SetFileAttributesW
lstrcmpA
SetDefaultCommConfigA
GetLastError
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
HeapCreate
ExitProcess
DecodePointer
WriteFile
GetStdHandle
EncodePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
FreeEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteConsoleW
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
Sleep
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
HeapSize
CreateFileW
CloseHandle
GetStringTypeW
HeapReAlloc
LCMapStringW
advapi32
CreateRestrictedToken
Sections
.text Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 646KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.perezay Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xod Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ