Static task
static1
Behavioral task
behavioral1
Sample
3eadb6a41b0a6fb57864a1c94d1068b381639ba86d9edd6b10708f9ca52e1bab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3eadb6a41b0a6fb57864a1c94d1068b381639ba86d9edd6b10708f9ca52e1bab.exe
Resource
win10v2004-20241007-en
General
-
Target
3eadb6a41b0a6fb57864a1c94d1068b381639ba86d9edd6b10708f9ca52e1bab
-
Size
4.4MB
-
MD5
b833b768dc13eb0ba0b335fc5aef8ef7
-
SHA1
91126dca1a861eb636327f3bd07dd83821c9dddd
-
SHA256
3eadb6a41b0a6fb57864a1c94d1068b381639ba86d9edd6b10708f9ca52e1bab
-
SHA512
48e81469825bdea1e71a1769205ba96f02b4942554574a48533d96022a2a981d056393c459f6952d7ce106b2cee76c2da9fd489a210a379699858f4933a00044
-
SSDEEP
98304:TPajUrk8TFhCDVZS8Asj0y0fY3dCX/Uv+zrbW5G2uQ+UIH:TGq3CDzOsYfY3KMMrbWWQg
Malware Config
Signatures
Files
-
3eadb6a41b0a6fb57864a1c94d1068b381639ba86d9edd6b10708f9ca52e1bab.exe windows:5 windows x86 arch:x86
8291759aef0e46c8057b5d52bd12239f
Code Sign
b3:90:26:9c:49:09:c0:3e:f8:01:e2:a1:e7:e7:ae:efCertificate
IssuerPOSTALCODE=10051Not Before15-09-2021 08:43Not After15-09-2022 08:43SubjectPOSTALCODE=10051a6:df:8d:6b:94:a1:ec:99:68:60:ec:35:6f:31:98:eb:5d:75:5e:03:ee:8d:5a:f4:18:d9:e7:f3:ee:49:a6:c3Signer
Actual PE Digesta6:df:8d:6b:94:a1:ec:99:68:60:ec:35:6f:31:98:eb:5d:75:5e:03:ee:8d:5a:f4:18:d9:e7:f3:ee:49:a6:c3Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\voxowicebeg\cagojamiw-bazajaxuwut\kekimayurox\nal\xi.pdb
Imports
kernel32
GetLocaleInfoA
LoadResource
ReadConsoleA
InterlockedDecrement
GetCurrentProcess
GetEnvironmentStringsW
GetUserDefaultLCID
FindActCtxSectionStringA
GetUserDefaultLangID
QueryActCtxW
InitializeCriticalSection
ReadConsoleInputA
GetSystemWindowsDirectoryA
LeaveCriticalSection
PulseEvent
VerifyVersionInfoA
WriteConsoleW
GetModuleFileNameW
ReleaseSemaphore
GetConsoleOutputCP
GetProcAddress
PrepareTape
OpenMutexA
LocalAlloc
GlobalGetAtomNameW
WaitForMultipleObjects
SetSystemTime
GetModuleFileNameA
GetModuleHandleA
FindFirstVolumeA
AddConsoleAliasA
GetProfileSectionW
GetCommandLineW
HeapAlloc
GetStartupInfoW
DeleteCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
CreateFileA
RaiseException
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
SetEndOfFile
GetProcessHeap
ReadFile
WriteConsoleA
user32
RealChildWindowFromPoint
Exports
Exports
@SetViceVariants@12
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ