C:\xijatot.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14c5d3f938ffaf9a07fc49afd4d5cd6d4669df28d3a06bd036a56a44e369c51d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
14c5d3f938ffaf9a07fc49afd4d5cd6d4669df28d3a06bd036a56a44e369c51d.exe
Resource
win10v2004-20241007-en
General
-
Target
14c5d3f938ffaf9a07fc49afd4d5cd6d4669df28d3a06bd036a56a44e369c51d
-
Size
262KB
-
MD5
5f4b4c493f1a8d3c5e91c3122d4bd017
-
SHA1
2ecf35fcc59743d28751d5104a10f0150a0c7869
-
SHA256
14c5d3f938ffaf9a07fc49afd4d5cd6d4669df28d3a06bd036a56a44e369c51d
-
SHA512
4130e4b033c25486eadbaddd730aacf3a04f3c65fbb53c480a8366e86da4bcd1743b1d63081db14af6f1e6a3f603875ab7909ee9280b525569259e4f15ca14ca
-
SSDEEP
6144:9UqrBRnd5U1hKx/ioFBsyRDRPzMZdCFJD+hOLs/ERo:SOLohKx/i5yRFzuMFAW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14c5d3f938ffaf9a07fc49afd4d5cd6d4669df28d3a06bd036a56a44e369c51d
Files
-
14c5d3f938ffaf9a07fc49afd4d5cd6d4669df28d3a06bd036a56a44e369c51d.exe windows:5 windows x86 arch:x86
8851c9f0c77f8ea0651ab311c7678050
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
GetFileSize
SetDefaultCommConfigA
SetPriorityClass
WritePrivateProfileStructA
GetConsoleAliasesLengthW
CopyFileExW
GetConsoleAliasExesA
GetStringTypeA
GetDriveTypeW
DebugActiveProcessStop
lstrcpynA
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
SetDllDirectoryW
InterlockedIncrement
_lwrite
VerSetConditionMask
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
GetCurrentActCtx
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
GetModuleHandleExW
SetConsoleScreenBufferSize
InterlockedCompareExchange
WriteConsoleInputA
GetLogicalDrives
CallNamedPipeW
FreeEnvironmentStringsA
SetTapeParameters
GetTickCount
GetCompressedFileSizeW
ReadConsoleOutputA
GetDateFormatA
FindActCtxSectionStringA
CreateActCtxW
EnumResourceTypesA
GetPrivateProfileIntA
GetSystemDirectoryW
AddRefActCtx
TerminateThread
ReadProcessMemory
GetSystemWow64DirectoryW
GetSystemWindowsDirectoryA
FormatMessageW
GetSystemTimeAdjustment
GetVersionExW
GetFileAttributesA
GetWriteWatch
VerifyVersionInfoA
GetBinaryTypeA
TerminateProcess
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
SetComputerNameExW
GetOverlappedResult
GetACP
GetVolumePathNameA
lstrlenW
UnregisterWait
SetThreadPriority
CreateMailslotW
DisconnectNamedPipe
GlobalUnfix
ReleaseActCtx
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetLastError
CreateNamedPipeA
EnumDateFormatsExA
WriteProfileSectionA
CopyFileA
SetComputerNameA
EnterCriticalSection
GlobalGetAtomNameA
DisableThreadLibraryCalls
DefineDosDeviceA
ResetEvent
_hwrite
OpenWaitableTimerA
GetLocalTime
GetAtomNameA
LoadLibraryA
WriteConsoleA
ProcessIdToSessionId
RegisterWaitForSingleObject
LocalAlloc
GetFileType
WritePrivateProfileStringA
MoveFileA
SetCurrentDirectoryW
HeapLock
FindAtomA
Module32FirstW
SetSystemTime
GlobalWire
GetModuleHandleA
FindFirstChangeNotificationA
CreateWaitableTimerW
lstrcatW
FindNextFileW
GetStringTypeW
GetConsoleTitleW
RequestWakeupLatency
BuildCommDCBA
VirtualProtect
EnumDateFormatsW
WaitForDebugEvent
OutputDebugStringA
SetCalendarInfoA
SetThreadAffinityMask
SetProcessShutdownParameters
EndUpdateResourceA
GetVersionExA
ReadConsoleInputW
TerminateJobObject
CloseHandle
GetCurrentProcessId
GetConsoleProcessList
FindNextVolumeA
FindNextVolumeMountPointW
GetThreadContext
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WideCharToMultiByte
GetCurrentProcess
IsDebuggerPresent
DeleteFileA
MultiByteToWideChar
GetModuleFileNameW
GetCommandLineA
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
GetModuleHandleW
GetProcAddress
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
DebugBreak
WriteConsoleW
OutputDebugStringW
LoadLibraryW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetStdHandle
GetConsoleOutputCP
SetFilePointer
advapi32
ImpersonateSelf
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ