C:\zihuj1_yusabirifalot mov\fotimivecexe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b12e31077a1ed6213ae8b8862cd30398b9f5ff192f37edb5bdcf13feae8e29fe.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b12e31077a1ed6213ae8b8862cd30398b9f5ff192f37edb5bdcf13feae8e29fe.exe
Resource
win10v2004-20241007-en
General
-
Target
b12e31077a1ed6213ae8b8862cd30398b9f5ff192f37edb5bdcf13feae8e29fe
-
Size
373KB
-
MD5
fc6929d01be5b69e53daa60a29cf126f
-
SHA1
aaad887ee0cdce292a5552c7fdeaf44763fdf5f3
-
SHA256
b12e31077a1ed6213ae8b8862cd30398b9f5ff192f37edb5bdcf13feae8e29fe
-
SHA512
e78f18772c992e2f6f3c977e1980a7a2dc8ab53a50ebb34d8b810c9150b7681df0b6dcb305b496caf930dc11c8c20cc3f86005188a100984120bb4331f2ce135
-
SSDEEP
6144:LVLIN2oLOtrJDYgcvZIB8WYHDXwOu1ql:LV6KtrJAeYjUql
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b12e31077a1ed6213ae8b8862cd30398b9f5ff192f37edb5bdcf13feae8e29fe
Files
-
b12e31077a1ed6213ae8b8862cd30398b9f5ff192f37edb5bdcf13feae8e29fe.exe windows:5 windows x86 arch:x86
aac454bd9c27c59510a0bbc09fbd7552
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetConsoleAliasExesLengthA
WaitNamedPipeA
AddConsoleAliasW
CreateHardLinkA
GetSystemDefaultLCID
GetModuleHandleW
GetTickCount
SetCommState
LoadLibraryW
CopyFileW
GetFileAttributesA
GetFileAttributesW
GetVolumePathNameA
lstrlenW
LCMapStringA
GetConsoleAliasesW
GetLastError
GetProcAddress
VirtualAlloc
WriteProfileSectionA
SetComputerNameA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
SetProcessWorkingSetSize
OpenJobObjectW
GetModuleHandleA
CreateMutexA
FindNextFileW
GetFileAttributesExW
AddConsoleAliasA
GetTempPathA
WriteProcessMemory
LCMapStringW
MultiByteToWideChar
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
CloseHandle
RaiseException
WriteFile
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
SetEndOfFile
GetProcessHeap
ReadFile
GetConsoleOutputCP
WriteConsoleW
shell32
CommandLineToArgvW
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 171KB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ