C:\hayanoram.pdb
Static task
static1
Behavioral task
behavioral1
Sample
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Resource
win10v2004-20250217-en
General
-
Target
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b
-
Size
192KB
-
MD5
59440276b249b38e5ad536f4a3ca922e
-
SHA1
db67605a431ee34e7c9f901c90eaa57b4505b7ba
-
SHA256
e62543f0558ee275d799b6f9d9369b442a300814b7c147eac65d639476910eb3
-
SHA512
a3bd20139e61a6dbcde863bf39f69bb3b19293174ea63e5eb2edeb3f1e317629f85fe1fe1d2088b50b6ef6294806e3ec886c5b6d952ba985f107fdfbf364435a
-
SSDEEP
3072:q75DzyLgv8vT6nRc24odbkDXFwzIc3jiptvwF:mDjv8v44o+X3pWF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b
Files
-
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe windows:5 windows x86 arch:x86
a4e1ff10d083ff95995012e5b2cbc654
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
GetThreadPriority
GetLastError
GetFileType
GetFileSize
VirtualQuery
AddAtomA
MapUserPhysicalPagesScatter
GetOEMCP
EnumDateFormatsA
SetConsoleDisplayMode
AddConsoleAliasW
VirtualProtect
ConnectNamedPipe
GlobalAlloc
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
CloseHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetStringTypeW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
DecodePointer
CreateFileW
RaiseException
advapi32
RegDeleteValueA
EnumDependentServicesA
Exports
Exports
_ExportFuncs@4
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.joyayuk Size: 512B - Virtual size: 290B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 49.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zar Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ