C:\vudefozah.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c7c187a6c1d1ce76d38bdde6b46fd9def61ecc0369f429762246b4a9ce68b8af.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c7c187a6c1d1ce76d38bdde6b46fd9def61ecc0369f429762246b4a9ce68b8af.exe
Resource
win10v2004-20241007-en
General
-
Target
c7c187a6c1d1ce76d38bdde6b46fd9def61ecc0369f429762246b4a9ce68b8af
-
Size
317KB
-
MD5
8a2cab95b036d182d6596ec22cf57bf3
-
SHA1
004c5b90076d3d25c8f462d038503a91f658bf84
-
SHA256
c7c187a6c1d1ce76d38bdde6b46fd9def61ecc0369f429762246b4a9ce68b8af
-
SHA512
3b44e1c116fa007654651d35e19b1976d384e3d00cd5cca9c82a39dfb4dbc8b9d8f8a0a92de3d86765f51027df075b521b55672603232cc85d5d9e7585c967a7
-
SSDEEP
3072:S5SNPqegctJkuME0HJosVJkdoNzNN3SpsxkgaBChUpZa9uD6Vdyhku:WxctJBME0HJXVJkMp9Suiga3wVfu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7c187a6c1d1ce76d38bdde6b46fd9def61ecc0369f429762246b4a9ce68b8af
Files
-
c7c187a6c1d1ce76d38bdde6b46fd9def61ecc0369f429762246b4a9ce68b8af.exe windows:5 windows x86 arch:x86
153dc3f428c35b5ce77e7e0eb3b25328
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MoveFileExW
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
GetEnvironmentStringsW
GetUserDefaultLCID
EnumCalendarInfoExW
GetConsoleAliasesLengthA
GetUserDefaultLangID
LoadLibraryW
SetConsoleMode
GetBinaryTypeA
GetGeoInfoA
GetSystemDirectoryA
lstrcmpW
GetShortPathNameA
FreeLibrary
SetLastError
GetProcAddress
RemoveDirectoryA
GetDiskFreeSpaceW
GetAtomNameA
LoadLibraryA
LocalAlloc
CreateEventW
GetModuleFileNameA
GetCommTimeouts
LCMapStringW
CreateFileW
RaiseException
FindResourceA
GetConsoleAliasesLengthW
SetDefaultCommConfigA
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
GetLastError
EnterCriticalSection
LeaveCriticalSection
Sleep
HeapSize
ExitProcess
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
GetModuleFileNameW
FreeEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
GetStringTypeW
RtlUnwind
HeapAlloc
HeapReAlloc
WriteConsoleW
CloseHandle
user32
ClientToScreen
gdi32
GetCharWidthFloatA
advapi32
ImpersonateAnonymousToken
winhttp
WinHttpSetTimeouts
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yadis Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yicar Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.lecahex Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nosozup Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 69KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ