C:\cahehawutepiza.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d9dc73ac106a1d05048ce61d6e4b617ae5b700202dd825ffb7e6226186d357a7N.exe
Resource
win7-20240708-en
General
-
Target
d9dc73ac106a1d05048ce61d6e4b617ae5b700202dd825ffb7e6226186d357a7N.exe
-
Size
728KB
-
MD5
096d916600270da3e1c1d78d0288af70
-
SHA1
f99cd749e84d0452dbe9d9fa8ea23280a6797214
-
SHA256
d9dc73ac106a1d05048ce61d6e4b617ae5b700202dd825ffb7e6226186d357a7
-
SHA512
73b83bffcd3b3c18398ab88d1dcb89523672fbea55b6fe2105a6c28ba428c10a2cf5251b50e0c982552867bff11eb42c96be91875c5d853e6b0474173d15c7af
-
SSDEEP
12288:WER9K8FUeR5Z9tRvSCJ6UJUdQ3MGKTOxT8LkMAr156KuGVW9HUPXNJ5AQAh5ShNG:WELNFUeLzvFAUOdQDKTbkMATpWxU1oiI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d9dc73ac106a1d05048ce61d6e4b617ae5b700202dd825ffb7e6226186d357a7N.exe
Files
-
d9dc73ac106a1d05048ce61d6e4b617ae5b700202dd825ffb7e6226186d357a7N.exe.exe windows:5 windows x86 arch:x86
ae4c4365921d918aef317ea7d06cb409
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapReAlloc
GetNativeSystemInfo
GetProfileIntW
FindResourceW
ReadConsoleA
GetProfileStringW
WaitForSingleObject
SetTapeParameters
MoveFileWithProgressA
GetTickCount
FindNextVolumeMountPointA
ExpandEnvironmentStringsA
FormatMessageA
WaitNamedPipeW
EnumTimeFormatsW
FindResourceExA
GetSystemDirectoryW
GetStringTypeExW
WritePrivateProfileStructW
IsProcessorFeaturePresent
GetModuleFileNameW
WritePrivateProfileStringW
ReplaceFileA
VerifyVersionInfoW
FillConsoleOutputCharacterW
GetLongPathNameA
HeapUnlock
MoveFileW
GetFirmwareEnvironmentVariableW
CreateMemoryResourceNotification
DefineDosDeviceA
LocalAlloc
FindFirstVolumeMountPointW
OpenEventA
WaitForMultipleObjects
GetVolumePathNamesForVolumeNameA
GetDefaultCommConfigA
WriteProfileStringA
GetModuleHandleA
SetLocaleInfoW
CreateMailslotA
VirtualProtect
GetVersion
GetConsoleProcessList
EnumSystemLocalesW
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
EncodePointer
DecodePointer
GetLastError
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
RaiseException
RtlUnwind
IsDebuggerPresent
HeapSize
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
GetStdHandle
WriteFile
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
OutputDebugStringW
GetStringTypeW
CloseHandle
user32
GetScrollBarInfo
MessageBoxW
GetMenuBarInfo
Sections
.text Size: 163KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 520KB - Virtual size: 520KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ