C:\pija\zocumepuwova\goco90\niluneme.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1ebaede751e7c84725a05ad56364c873c53711485e37128cdd64b1c8af43b1c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1ebaede751e7c84725a05ad56364c873c53711485e37128cdd64b1c8af43b1c3.exe
Resource
win10v2004-20241007-en
General
-
Target
1ebaede751e7c84725a05ad56364c873c53711485e37128cdd64b1c8af43b1c3
-
Size
207KB
-
MD5
bb9fec798c76678a9113c967efa9647c
-
SHA1
19a6e628f455afd5fb3c7591e642e76a2bfc5e78
-
SHA256
1ebaede751e7c84725a05ad56364c873c53711485e37128cdd64b1c8af43b1c3
-
SHA512
87300e22b3cd63a198d2e1f423744374a19487a1971f2833a073b395a5a72127305d85f4558778aa2d8cdbe4fe6a68ac43aa5643f9db3a4ed513dcd32eb3ab5c
-
SSDEEP
3072:XPdw2xBZSR+5YSLPKL/56Mnkj54N+xaqJRv4K+:TZnYSDu/56wk94N+xaqJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ebaede751e7c84725a05ad56364c873c53711485e37128cdd64b1c8af43b1c3
Files
-
1ebaede751e7c84725a05ad56364c873c53711485e37128cdd64b1c8af43b1c3.exe windows:5 windows x86 arch:x86
80467bb051e50564ec807506b33eeac7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FoldStringW
OpenWaitableTimerA
WaitNamedPipeA
CommConfigDialogW
SetSystemTimeAdjustment
SearchPathA
GetCPInfoExA
GetModuleFileNameW
DeleteFileW
GetConsoleAliasesLengthW
EnumResourceTypesW
FillConsoleOutputCharacterA
WriteConsoleOutputCharacterA
LocalAlloc
GetProcAddress
VirtualAlloc
LoadLibraryW
ReleaseActCtx
GetConsoleAliasA
FindFirstChangeNotificationW
WritePrivateProfileStringW
GetModuleHandleA
UnlockFileEx
lstrcpynA
AddAtomA
GenerateConsoleCtrlEvent
GetLastError
GetSystemDefaultLCID
GetSystemDefaultLangID
FindNextFileW
GetPriorityClass
SetConsoleCursorInfo
OpenJobObjectW
InitializeCriticalSection
FindResourceExW
GetConsoleMode
_hwrite
GlobalWire
GetComputerNameW
VerifyVersionInfoA
GetStringTypeA
FillConsoleOutputCharacterW
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
GetFileAttributesExA
SetComputerNameW
GetFileAttributesA
ReadConsoleA
GetVolumePathNameA
EnumResourceNamesW
CreateFileA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCommandLineA
GetStartupInfoA
RaiseException
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
RtlUnwind
SetFilePointer
ReadFile
SetStdHandle
GetConsoleCP
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
ScreenToClient
gdi32
GetCharWidth32A
GetFontUnicodeRanges
msimg32
AlphaBlend
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ