C:\mazutayivomili-dovefuvo\kevumiv_h.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e7a5749423d6baa72cd39a8691ae1b0663f1cf2b59ce5efced5fd558e26041bf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7a5749423d6baa72cd39a8691ae1b0663f1cf2b59ce5efced5fd558e26041bf.exe
Resource
win10v2004-20241007-en
General
-
Target
e7a5749423d6baa72cd39a8691ae1b0663f1cf2b59ce5efced5fd558e26041bf
-
Size
263KB
-
MD5
23ed01171a51253efd2f0618eff8facd
-
SHA1
cab3bf4ec74677aca3c2dcd42e4c24c68e78d789
-
SHA256
e7a5749423d6baa72cd39a8691ae1b0663f1cf2b59ce5efced5fd558e26041bf
-
SHA512
59cb46f0193dcbb22543627ad387e1340278a394f8e161387aabdf5643ec695372bdd381d3d2e415e0425e15aa03d1a9db1f3d033db8421de4c1b1d3802587bf
-
SSDEEP
6144:wTxKulfXIA7H6lYF2dbZjXSGgbmvOfebxgzJOgo:aLfnD6li2dZSGglfebxgzJO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e7a5749423d6baa72cd39a8691ae1b0663f1cf2b59ce5efced5fd558e26041bf
Files
-
e7a5749423d6baa72cd39a8691ae1b0663f1cf2b59ce5efced5fd558e26041bf.exe windows:5 windows x86 arch:x86
c54b56bb3681ebf70ded458f5fa7de29
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
GetFileSize
SetDefaultCommConfigA
SetPriorityClass
WritePrivateProfileStructA
GetConsoleAliasesLengthW
CopyFileExW
GetConsoleAliasExesA
GetStringTypeA
GetDriveTypeW
DebugActiveProcessStop
lstrcpynA
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
SetDllDirectoryW
InterlockedIncrement
_lwrite
VerSetConditionMask
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
GetCurrentActCtx
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
GetModuleHandleExW
SetConsoleScreenBufferSize
InterlockedCompareExchange
WriteConsoleInputA
GetLogicalDrives
CallNamedPipeW
FreeEnvironmentStringsA
SetTapeParameters
GetTickCount
GetCompressedFileSizeW
ReadConsoleOutputA
GetDateFormatA
FindActCtxSectionStringA
CreateActCtxW
EnumResourceTypesA
GetPrivateProfileIntA
GetSystemDirectoryW
AddRefActCtx
TerminateThread
ReadProcessMemory
GetSystemWow64DirectoryW
GetSystemWindowsDirectoryA
FormatMessageW
GetSystemTimeAdjustment
GetVersionExW
GetFileAttributesA
GetWriteWatch
VerifyVersionInfoA
GetBinaryTypeA
TerminateProcess
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
SetComputerNameExW
GetOverlappedResult
GetACP
GetVolumePathNameA
lstrlenW
UnregisterWait
SetThreadPriority
CreateMailslotW
DisconnectNamedPipe
GlobalUnfix
ReleaseActCtx
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetLastError
CreateNamedPipeA
EnumDateFormatsExA
WriteProfileSectionA
CopyFileA
SetComputerNameA
EnterCriticalSection
GlobalGetAtomNameA
DisableThreadLibraryCalls
DefineDosDeviceA
ResetEvent
_hwrite
OpenWaitableTimerA
GetLocalTime
GetAtomNameA
LoadLibraryA
WriteConsoleA
ProcessIdToSessionId
RegisterWaitForSingleObject
LocalAlloc
GetFileType
WritePrivateProfileStringA
MoveFileA
SetCurrentDirectoryW
HeapLock
FindAtomA
Module32FirstW
SetSystemTime
GlobalWire
GetModuleHandleA
FindFirstChangeNotificationA
CreateWaitableTimerW
lstrcatW
FindNextFileW
GetStringTypeW
GetConsoleTitleW
RequestWakeupLatency
BuildCommDCBA
VirtualProtect
EnumDateFormatsW
WaitForDebugEvent
OutputDebugStringA
SetCalendarInfoA
SetThreadAffinityMask
SetProcessShutdownParameters
EndUpdateResourceA
GetVersionExA
ReadConsoleInputW
TerminateJobObject
CloseHandle
GetCurrentProcessId
GetConsoleProcessList
FindNextVolumeA
FindNextVolumeMountPointW
GetThreadContext
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WideCharToMultiByte
GetCurrentProcess
IsDebuggerPresent
DeleteFileA
GetModuleFileNameW
GetCommandLineA
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
GetModuleHandleW
GetProcAddress
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
DebugBreak
WriteConsoleW
OutputDebugStringW
LoadLibraryW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetLocaleInfoA
SetStdHandle
GetConsoleOutputCP
SetFilePointer
advapi32
ImpersonateSelf
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ