C:\mevewafuloyuku\gamoke\cuseyuyovu\sojafo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e7bb17eee0cfac2238a7f49b6d3786c35173000646b309645efc8a84ca00c1a6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7bb17eee0cfac2238a7f49b6d3786c35173000646b309645efc8a84ca00c1a6.exe
Resource
win10v2004-20241007-en
General
-
Target
e7bb17eee0cfac2238a7f49b6d3786c35173000646b309645efc8a84ca00c1a6
-
Size
263KB
-
MD5
a2139053e0e8a371dcf2365d132b9107
-
SHA1
9557a8f8977a179328fb97d72de659a582693df7
-
SHA256
e7bb17eee0cfac2238a7f49b6d3786c35173000646b309645efc8a84ca00c1a6
-
SHA512
08673a70a7e071422bc1d33b01eb1bdce10a81874b01370d7e2148e4127cdc7c2d636ee8c2c6dcc9dc4664dc436fa43f6b651ccd0408d6a596f43d55c89b1236
-
SSDEEP
6144:rYuzjp8wDz70r6lzRnKAPGtt3//9Z3Kt4tq1gKo:kk+uMulzRnKAPGf/r6t4w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e7bb17eee0cfac2238a7f49b6d3786c35173000646b309645efc8a84ca00c1a6
Files
-
e7bb17eee0cfac2238a7f49b6d3786c35173000646b309645efc8a84ca00c1a6.exe windows:5 windows x86 arch:x86
03d741c0997afad4183375be70028b61
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
GetFileSize
SetDefaultCommConfigA
SetPriorityClass
WritePrivateProfileStructA
GetConsoleAliasesLengthW
CopyFileExW
GetConsoleAliasExesA
GetStringTypeA
GetDriveTypeW
DebugActiveProcessStop
lstrcpynA
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
SetDllDirectoryW
EndUpdateResourceW
InterlockedIncrement
_lwrite
VerSetConditionMask
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
GetCurrentActCtx
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
GetModuleHandleExW
SetConsoleScreenBufferSize
InterlockedCompareExchange
WriteConsoleInputA
GetLogicalDrives
CallNamedPipeW
FreeEnvironmentStringsA
SetTapeParameters
GetTickCount
GetConsoleTitleA
GetCompressedFileSizeW
ReadConsoleOutputA
GetDateFormatA
FindActCtxSectionStringA
CreateActCtxW
EnumResourceTypesA
GetPrivateProfileIntA
GetSystemDirectoryW
AddRefActCtx
TerminateThread
ReadProcessMemory
GetSystemWow64DirectoryW
GetSystemWindowsDirectoryA
FormatMessageW
GetSystemTimeAdjustment
GetVersionExW
GetFileAttributesA
GetWriteWatch
GetFileAttributesW
VerifyVersionInfoA
GetBinaryTypeA
TerminateProcess
GetMailslotInfo
GetCompressedFileSizeA
GetTimeZoneInformation
SetComputerNameExW
GetOverlappedResult
UnregisterWait
GetVolumePathNameA
lstrlenW
FindNextVolumeMountPointW
SetThreadPriority
CreateMailslotW
DisconnectNamedPipe
GlobalUnfix
ReleaseActCtx
GetStartupInfoA
GetCPInfoExW
FillConsoleOutputCharacterW
GetLastError
CreateNamedPipeA
EnumDateFormatsExA
HeapUnlock
WriteProfileSectionA
CopyFileA
SetComputerNameA
EnterCriticalSection
GlobalGetAtomNameA
DisableThreadLibraryCalls
BuildCommDCBW
DefineDosDeviceA
ResetEvent
_hwrite
OpenWaitableTimerA
GetLocalTime
GetAtomNameA
LoadLibraryA
WriteConsoleA
ProcessIdToSessionId
RegisterWaitForSingleObject
LocalAlloc
GetFileType
WritePrivateProfileStringA
MoveFileA
SetCurrentDirectoryW
FindAtomA
SetSystemTime
GlobalWire
GetModuleHandleA
FindFirstChangeNotificationA
CreateWaitableTimerW
lstrcatW
FindNextFileW
GetStringTypeW
RequestWakeupLatency
VirtualProtect
EnumDateFormatsW
WaitForDebugEvent
OutputDebugStringA
SetCalendarInfoA
SetThreadAffinityMask
SetProcessShutdownParameters
Module32NextW
GetVersionExA
ReadConsoleInputW
TerminateJobObject
CloseHandle
GetCurrentProcessId
GetConsoleProcessList
FindNextVolumeA
GetACP
GetThreadContext
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
WideCharToMultiByte
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteFileA
MultiByteToWideChar
GetModuleFileNameW
GetCommandLineA
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
SetStdHandle
WriteFile
GetConsoleCP
GetConsoleMode
GetOEMCP
GetCPInfo
IsValidCodePage
GetProcAddress
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
DebugBreak
GetStdHandle
WriteConsoleW
OutputDebugStringW
ExitProcess
LoadLibraryW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetLocaleInfoA
advapi32
ImpersonateSelf
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ