C:\bejihivug\fiyuzidohunil79\vizerugigefak\vepaweme\kakubowiwonix\t.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
04672ac92929c1b2589702f4c0dac7e18f0a2858542809a9c88014826a6df3f6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04672ac92929c1b2589702f4c0dac7e18f0a2858542809a9c88014826a6df3f6.exe
Resource
win10v2004-20241007-en
General
-
Target
04672ac92929c1b2589702f4c0dac7e18f0a2858542809a9c88014826a6df3f6
-
Size
876KB
-
MD5
41b0583e986bd5b29056fe47535545e3
-
SHA1
f7e44e9d530f70621a47e9f850da1bb5e2871960
-
SHA256
04672ac92929c1b2589702f4c0dac7e18f0a2858542809a9c88014826a6df3f6
-
SHA512
beba9665b1635d2b07b726552fa23637a20cca144787833bfd77aa83cfa75f12fc4e2ea632efd08a6403eb6b646326d8f94fac282a81f05a929231e7f8ce4782
-
SSDEEP
12288:nPmDfAmqboRKh2b/fD3E735ylKz8MLzKs43aK55d6B4MXR+EQYV6nm/PfP6ultXm:nq7xRKhE/rEslmTLa55d6ShEq8PTc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04672ac92929c1b2589702f4c0dac7e18f0a2858542809a9c88014826a6df3f6
Files
-
04672ac92929c1b2589702f4c0dac7e18f0a2858542809a9c88014826a6df3f6.exe windows:5 windows x86 arch:x86
f4ab55e39b7ba028d951c95017403578
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateNamedPipeA
TerminateThread
DeactivateActCtx
GetConsoleAliasesLengthW
GetVersionExW
GetConsoleOutputCP
GetDefaultCommConfigW
FindFirstFileExW
GetDriveTypeA
FreeEnvironmentStringsW
GetProcessPriorityBoost
SetVolumeMountPointW
SetCurrentDirectoryW
GetLongPathNameA
TlsGetValue
SetComputerNameExW
FindAtomA
BuildCommDCBAndTimeoutsA
VirtualProtect
GetModuleHandleA
GlobalAlloc
InitializeCriticalSection
TlsSetValue
GetCommandLineA
InterlockedDecrement
GetCalendarInfoA
CopyFileW
ZombifyActCtx
OutputDebugStringW
GetSystemTimeAdjustment
GetPriorityClass
WritePrivateProfileStringW
GetProcessHeap
GlobalUnWire
HeapCompact
GetStartupInfoA
GetDiskFreeSpaceExW
GetCPInfoExW
GetWindowsDirectoryA
GetSystemWow64DirectoryW
GetLastError
GetProfileStringW
WriteProfileSectionW
GetProfileStringA
SetConsoleCursorPosition
SetLastError
DeleteVolumeMountPointA
DebugBreak
GetPrivateProfileSectionW
ReadFileScatter
GetNumberOfConsoleInputEvents
GetSystemWindowsDirectoryW
TerminateProcess
GlobalFindAtomA
FindCloseChangeNotification
CreateActCtxA
SetMailslotInfo
InterlockedExchange
DefineDosDeviceA
SetVolumeMountPointA
EndUpdateResourceA
WriteConsoleW
GetPrivateProfileSectionA
WritePrivateProfileSectionW
GetPrivateProfileStructA
TryEnterCriticalSection
GetFileAttributesExW
LocalFileTimeToFileTime
MoveFileW
GetVolumePathNameW
HeapSetInformation
lstrcmpW
GetComputerNameA
FindActCtxSectionStringA
SetThreadContext
MoveFileExA
GlobalUnlock
UnregisterWait
BuildCommDCBW
GlobalDeleteAtom
GetShortPathNameA
OpenEventA
SetCommTimeouts
WaitNamedPipeA
CreateIoCompletionPort
FindResourceExW
GetSystemTimeAsFileTime
GetSystemInfo
SetLocalTime
OpenSemaphoreA
FreeEnvironmentStringsA
GetProcAddress
GetPrivateProfileSectionNamesA
SetFileShortNameW
lstrcpyW
VerLanguageNameA
GetThreadSelectorEntry
GetSystemTime
UnlockFile
GetConsoleCP
GetConsoleAliasW
SetConsoleScreenBufferSize
GetAtomNameA
WriteConsoleInputW
TransactNamedPipe
SetCommState
SetHandleCount
_lopen
ResetWriteWatch
ClearCommBreak
GetModuleHandleW
GetOverlappedResult
EnumDateFormatsW
GetConsoleAliasExesLengthA
WriteConsoleOutputCharacterW
HeapReAlloc
OpenMutexA
GetStringTypeW
SetFilePointer
PostQueuedCompletionStatus
AreFileApisANSI
CancelWaitableTimer
GetCurrentProcess
GetNamedPipeInfo
GetCompressedFileSizeW
FindNextVolumeMountPointA
GetFullPathNameW
WriteProfileStringW
DeleteAtom
GlobalAddAtomA
TerminateJobObject
SetFirmwareEnvironmentVariableA
GetBinaryTypeW
QueryDosDeviceW
LeaveCriticalSection
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
InterlockedCompareExchange
Sleep
DeleteCriticalSection
EnterCriticalSection
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
MoveFileA
LCMapStringA
LCMapStringW
GetCPInfo
HeapValidate
IsBadReadPtr
TlsAlloc
GetCurrentThreadId
TlsFree
GetStdHandle
WriteFile
OutputDebugStringA
GetFileType
ExitProcess
LoadLibraryW
CloseHandle
GetACP
GetOEMCP
IsValidCodePage
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetLocaleInfoA
GetStringTypeA
HeapAlloc
HeapSize
VirtualAlloc
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
FlushFileBuffers
GetConsoleMode
InitializeCriticalSectionAndSpinCount
LoadLibraryA
SetStdHandle
GetLocaleInfoW
WriteConsoleA
CreateFileA
DeleteFileA
user32
OemToCharA
msimg32
AlphaBlend
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 586KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pinoroz Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ