C:\fipexubedahoyi-votucijon61\sedo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
cfeb08d9ed58676fff3aea64d32bdefd7f61a3926f5aa2020a2dfa4518317548.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfeb08d9ed58676fff3aea64d32bdefd7f61a3926f5aa2020a2dfa4518317548.exe
Resource
win10v2004-20241007-en
General
-
Target
cfeb08d9ed58676fff3aea64d32bdefd7f61a3926f5aa2020a2dfa4518317548
-
Size
304KB
-
MD5
c1cbf5c1fb25447177f070dbb4905acc
-
SHA1
520157e83f03ec9cdc4904ea2d6955f2baf738a8
-
SHA256
cfeb08d9ed58676fff3aea64d32bdefd7f61a3926f5aa2020a2dfa4518317548
-
SHA512
ccf32681f4bdc750c4dda5711dd9576618436d957b5aa0cd28f8502e1e4e696206aa6be5561e364e55c98e975d50b0f90551b87eb6f771edc3aaf6f4d83e2cd2
-
SSDEEP
6144:FTS+MiGPrv6H/fGDUI2HdwB0JWY2PpLfWSR11k:F+/bE/OoHdwB6WnpLfW+k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cfeb08d9ed58676fff3aea64d32bdefd7f61a3926f5aa2020a2dfa4518317548
Files
-
cfeb08d9ed58676fff3aea64d32bdefd7f61a3926f5aa2020a2dfa4518317548.exe windows:5 windows x86 arch:x86
1dd726520e2e2364fd0217d0df0f77fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateTimerQueue
GetFileSize
SetThreadContext
GetConsoleAliasesLengthW
CopyFileExW
GetModuleHandleExA
GetConsoleAliasExesA
SetComputerNameExA
GetDriveTypeW
MoveFileExA
DebugActiveProcessStop
lstrcpynA
GetConsoleAliasExesLengthA
FindResourceW
BuildCommDCBAndTimeoutsA
LoadResource
InterlockedIncrement
_lwrite
GetQueuedCompletionStatus
VerSetConditionMask
ReadConsoleA
InterlockedDecrement
SetDefaultCommConfigW
GetSystemWindowsDirectoryW
GetProfileSectionA
SetConsoleScreenBufferSize
WriteConsoleInputA
GetComputerNameW
GetLogicalDrives
FreeEnvironmentStringsA
GetProcessPriorityBoost
GetModuleHandleW
GetTickCount
GetDllDirectoryW
GetPrivateProfileStringW
GetConsoleTitleA
ReadConsoleOutputA
GetDateFormatA
GetCommandLineA
CreateActCtxW
EnumResourceTypesA
GetPriorityClass
GetPrivateProfileIntA
GetSystemDirectoryW
AddRefActCtx
CopyFileW
AssignProcessToJobObject
GetCalendarInfoA
ReadProcessMemory
GetSystemWow64DirectoryW
SetSystemTimeAdjustment
FormatMessageW
GetVersionExW
GetFileAttributesA
WritePrivateProfileStructW
GetConsoleAliasW
GetWriteWatch
GetBinaryTypeA
TerminateProcess
GetAtomNameW
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
CreateFileW
GetOverlappedResult
GetACP
lstrcmpW
GetVolumePathNameA
lstrlenW
FindNextVolumeMountPointW
CreateMailslotW
DisconnectNamedPipe
DeactivateActCtx
GetNamedPipeHandleStateW
ReleaseActCtx
SetCurrentDirectoryA
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetHandleInformation
GetLastError
GetLongPathNameW
ReadConsoleOutputCharacterA
CreateNamedPipeA
EnumDateFormatsExA
WriteProfileSectionA
SetComputerNameA
DefineDosDeviceA
ResetEvent
OpenWaitableTimerA
GetLocalTime
LoadLibraryA
WriteConsoleA
ProcessIdToSessionId
UnhandledExceptionFilter
InterlockedExchangeAdd
LocalAlloc
SetCalendarInfoW
WritePrivateProfileStringA
MoveFileA
BuildCommDCBAndTimeoutsW
SetConsoleOutputCP
GetExitCodeThread
HeapLock
GetTapeParameters
FoldStringA
SetSystemTime
GlobalWire
GetOEMCP
FindNextFileA
EnumDateFormatsA
FindFirstChangeNotificationA
CreateWaitableTimerW
lstrcatW
GetStringTypeW
BuildCommDCBA
VirtualProtect
OutputDebugStringA
SetThreadAffinityMask
EndUpdateResourceA
CloseHandle
GetVersion
DeleteFileW
GetCurrentProcessId
DebugBreak
FindActCtxSectionStringW
SetUnhandledExceptionFilter
WideCharToMultiByte
GetStartupInfoW
HeapValidate
IsBadReadPtr
RaiseException
Sleep
GetProcAddress
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
GetCurrentProcess
IsDebuggerPresent
GetModuleFileNameW
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
DeleteCriticalSection
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
WriteConsoleW
OutputDebugStringW
LoadLibraryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
SetStdHandle
GetConsoleOutputCP
FlushFileBuffers
CreateFileA
DeleteFileA
GetModuleHandleA
Sections
.text Size: 186KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 319KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ