C:\woxaxavira97\kakusovac diwahadodipefe\poniy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
72e126ee57a938fc41d5e1b3242354ec2172d7d4fdeb599409b7733624461bd7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72e126ee57a938fc41d5e1b3242354ec2172d7d4fdeb599409b7733624461bd7.exe
Resource
win10v2004-20241007-en
General
-
Target
72e126ee57a938fc41d5e1b3242354ec2172d7d4fdeb599409b7733624461bd7
-
Size
293KB
-
MD5
a39a593847aec5da6930cadb4396bc43
-
SHA1
f1f8109190ded61e34cbf0167bef7011dc8bce28
-
SHA256
72e126ee57a938fc41d5e1b3242354ec2172d7d4fdeb599409b7733624461bd7
-
SHA512
1802cab025c25e36b0967cef21c94e44b01b1074f0be82a20dd26a9feb9799e424a22487a58c090cbe09c6d2e38710e86f8ab2a93f282c493bc7fe520172fab5
-
SSDEEP
3072:hiw4BLX97EhE0E+c6mnjpz0e0sxkgaBChUpZa9uD6Vdyhk:hwX9whE0E+c6mlAeBiga3wVf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72e126ee57a938fc41d5e1b3242354ec2172d7d4fdeb599409b7733624461bd7
Files
-
72e126ee57a938fc41d5e1b3242354ec2172d7d4fdeb599409b7733624461bd7.exe windows:5 windows x86 arch:x86
a8456671b95a4485dcd9277ddaf595e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CommConfigDialogA
FindResourceW
FreeLibrary
GetCurrentProcess
GetEnvironmentStringsW
GetModuleHandleW
GlobalAlloc
GetSystemDirectoryW
LoadLibraryW
CreateEventA
SetConsoleMode
GetBinaryTypeA
GetModuleFileNameW
InterlockedExchange
GetConsoleAliasesLengthW
SetLastError
GetProcAddress
MoveFileW
GetDiskFreeSpaceW
LoadLibraryA
GetProcessWorkingSetSize
TransmitCommChar
OpenJobObjectW
EnumCalendarInfoExA
SetFileAttributesW
lstrcmpA
SetDefaultCommConfigA
GetLastError
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
HeapCreate
ExitProcess
DecodePointer
WriteFile
GetStdHandle
EncodePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
FreeEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WriteConsoleW
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
Sleep
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RaiseException
HeapSize
CreateFileW
CloseHandle
GetStringTypeW
HeapReAlloc
LCMapStringW
advapi32
CreateRestrictedToken
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 646KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tidikad Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.saz Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ