C:\gapazufa.pdb
Static task
static1
Behavioral task
behavioral1
Sample
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe
Resource
win10v2004-20241007-en
General
-
Target
5fce027a647cc4ce87e15cd96b3531d61e008e79221cf1de01287021f05e2a5d
-
Size
206KB
-
MD5
915a9d6dd240422e41c99175d3f8a375
-
SHA1
de6a1ab0ed7403e58a1e4ddf5efabf076320bde4
-
SHA256
5fce027a647cc4ce87e15cd96b3531d61e008e79221cf1de01287021f05e2a5d
-
SHA512
a13aeeccfdd59e40f87744d6265292f46a28694f9cd26bb0a3d7207dcf491959fe0ba2d585465ad9d03c225dab7822351d2b2cc0988e6335bbe85763f68fb1a8
-
SSDEEP
6144:fFr8GBofok1bHyX1heFZU1EwFXGHPEuL+ahe:fLCfoOTyXGQbFMPEic
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50
Files
-
5fce027a647cc4ce87e15cd96b3531d61e008e79221cf1de01287021f05e2a5d.zip
-
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe windows:5 windows x86 arch:x86
6d50de5d9e6eedfa2f6d928af4dafee7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemDefaultLangID
SetProcessAffinityMask
GetStringTypeA
WriteConsoleOutputCharacterA
OpenJobObjectA
GetCommState
WaitNamedPipeA
CreateHardLinkA
GetModuleHandleW
GetTickCount
GetVolumePathNameW
GetPrivateProfileIntA
LoadLibraryW
CopyFileW
GetFileAttributesA
GetFileAttributesW
lstrlenW
LCMapStringA
GetConsoleAliasesW
GetProfileIntA
GetLastError
GetProcAddress
VirtualAlloc
SetComputerNameA
WriteConsoleA
LocalAlloc
SetProcessWorkingSetSize
GetModuleHandleA
CreateMutexA
FindNextFileW
GetFileAttributesExW
AddConsoleAliasA
SetFileAttributesW
LCMapStringW
Sleep
ExitProcess
GetStartupInfoW
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
WriteFile
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
WideCharToMultiByte
CreateFileA
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
GetStringTypeW
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
SetEndOfFile
GetProcessHeap
ReadFile
RaiseException
GetConsoleOutputCP
WriteConsoleW
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ