Static task
static1
Behavioral task
behavioral1
Sample
436e04367504634a4e633542409a2288cce439300f2050a2bc18d9296933a8cf.exe
Resource
win10v2004-20230220-en
General
-
Target
436e04367504634a4e633542409a2288cce439300f2050a2bc18d9296933a8cf
-
Size
743KB
-
MD5
781a4607d324a2301c3f8bdfda3e8cd4
-
SHA1
6b87d9e7fed19e1fff72b1df0803e5739d92ded9
-
SHA256
436e04367504634a4e633542409a2288cce439300f2050a2bc18d9296933a8cf
-
SHA512
ee7d6f27e407143810933770329099e737a4779ad095dd39ab6afd0d2e7dedebad4a71c9a42e4a87c969e84d3df5f28adcf7cfdf8fc898d897d845b8913fcb39
-
SSDEEP
12288:tD5NtT0urr0y8CHQGKG7W2+0b/g3GMmg7qSNjgRM9uO/47EowxIuglwR4gp+:tFX0ry8CJKG7W2XbY3qsLh8mEEo0IuMr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 436e04367504634a4e633542409a2288cce439300f2050a2bc18d9296933a8cf
Files
-
436e04367504634a4e633542409a2288cce439300f2050a2bc18d9296933a8cf.exe windows x86
f6cf11dd58eb8f8d926882e6663630c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
SearchPathW
GetDriveTypeW
GetProfileIntW
GetNumberOfConsoleInputEvents
InterlockedIncrement
EnumCalendarInfoW
InterlockedDecrement
GlobalSize
InitializeSListHead
CallNamedPipeW
MoveFileWithProgressA
GetTickCount
GetConsoleTitleA
ReadConsoleW
SetCommState
GetDriveTypeA
GlobalAlloc
GetPrivateProfileIntA
AddRefActCtx
LoadLibraryW
GetConsoleAliasExesLengthW
GetStringTypeExW
GetFileAttributesA
WriteConsoleW
GetOverlappedResult
GetVolumePathNameA
FindNextVolumeMountPointW
RaiseException
GlobalUnfix
GetStdHandle
GetCurrentDirectoryW
GetProcAddress
RemoveDirectoryA
SetComputerNameA
VerLanguageNameW
PrepareTape
LoadLibraryA
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
AddAtomW
BeginUpdateResourceA
SetThreadIdealProcessor
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
SetLocaleInfoW
lstrcatW
FreeEnvironmentStringsW
GetStringTypeW
EnumDateFormatsW
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
EnumSystemLocalesW
DeleteFileA
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MoveFileA
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetModuleFileNameW
HeapSize
CloseHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CreateFileW
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 593KB - Virtual size: 801KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sot Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ