C:\vikokogifuwaxu\pilicacoyopave\larapu48_lemowujutu\sif\cayoru va.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e12b18395e450ac8d2002761988db2d374062b57c0bdde762c39d438f9ef1a9b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e12b18395e450ac8d2002761988db2d374062b57c0bdde762c39d438f9ef1a9b.exe
Resource
win10v2004-20241007-en
General
-
Target
e12b18395e450ac8d2002761988db2d374062b57c0bdde762c39d438f9ef1a9b
-
Size
262KB
-
MD5
68e8c93c0c231ef5de9299111d7347e4
-
SHA1
d2841cbe43b55a34a128344881800a15b19e0133
-
SHA256
e12b18395e450ac8d2002761988db2d374062b57c0bdde762c39d438f9ef1a9b
-
SHA512
5060e80283f722a04143b0a10a63a36ecba80f5dc7521d55b47018981a4454e748f2b5c1cb04137619b09d67469495ed2087ea7a0dafea94b59f346ccfb00fa4
-
SSDEEP
3072:7YwDzBsqEOW9Yy2Qm4j+3BE4nrdbArZisxkgaBChUpZa9uD6Vdyhk:0OsqpW9pE3aariZfiga3wVf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e12b18395e450ac8d2002761988db2d374062b57c0bdde762c39d438f9ef1a9b
Files
-
e12b18395e450ac8d2002761988db2d374062b57c0bdde762c39d438f9ef1a9b.exe windows:5 windows x86 arch:x86
6bf4d50d0d6cbd671de7b8039290ecde
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SetDefaultCommConfigW
GetUserDefaultLCID
EnumCalendarInfoExW
GetUserDefaultLangID
GetEnvironmentStrings
LoadLibraryW
SetConsoleMode
GetBinaryTypeA
GetGeoInfoA
GetSystemDirectoryA
lstrcmpW
GetLastError
SetLastError
GetProcAddress
MoveFileExW
RemoveDirectoryA
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
GetProcessId
InterlockedExchangeAdd
LocalAlloc
OpenEventA
OpenJobObjectW
GetCommTimeouts
GetShortPathNameW
GetCurrentProcessId
LCMapStringW
CreateFileW
RaiseException
GetConsoleAliasesLengthW
FreeLibrary
FindResourceA
HeapSize
FlushFileBuffers
HeapAlloc
MultiByteToWideChar
HeapReAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
HeapFree
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
GetStringTypeW
RtlUnwind
WriteConsoleW
SetStdHandle
CloseHandle
user32
ClientToScreen
gdi32
GetCharWidthFloatA
advapi32
CreateRestrictedToken
winhttp
WinHttpSetTimeouts
Sections
.text Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nomatec Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nuli Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ