Static task
static1
Behavioral task
behavioral1
Sample
1d94b2f754fc421be9bacadd360061a685f2faf3595b7f453e4227a0fd07a8a2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1d94b2f754fc421be9bacadd360061a685f2faf3595b7f453e4227a0fd07a8a2.exe
Resource
win10v2004-20230220-en
General
-
Target
1d94b2f754fc421be9bacadd360061a685f2faf3595b7f453e4227a0fd07a8a2
-
Size
263KB
-
MD5
eb08adb802457a9fe7a364da758ac764
-
SHA1
3c176ecf1661c9146d17f12ee19c9d1b14d92643
-
SHA256
1d94b2f754fc421be9bacadd360061a685f2faf3595b7f453e4227a0fd07a8a2
-
SHA512
dc86c13a002b801c2f18506c3a70cb908deea55824f9d464ee1fb3a4fe3b71236afcd870a194e3fadaa685154082a71d87b994b137fc149c9ee0434dfc50d881
-
SSDEEP
3072:Hl42iGxUvzLMfsYjO7FNhgqVVMa6fmq2QNHoLzSoKmEY0E0/QuZ:+9NbQfsSOxgqzMF/fuXV0Iu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d94b2f754fc421be9bacadd360061a685f2faf3595b7f453e4227a0fd07a8a2
Files
-
1d94b2f754fc421be9bacadd360061a685f2faf3595b7f453e4227a0fd07a8a2.exe windows x86
2d39bee49f300ea90fe79768115a52cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SearchPathW
GetDriveTypeW
GetProfileIntW
GetNumberOfConsoleInputEvents
BuildCommDCBAndTimeoutsA
InterlockedIncrement
EnumCalendarInfoW
GlobalSize
InitializeSListHead
SetComputerNameW
CallNamedPipeW
MoveFileWithProgressA
GetTickCount
FindNextVolumeMountPointA
GetConsoleTitleA
ReadConsoleW
SetCommState
GetDriveTypeA
GetPrivateProfileIntA
AddRefActCtx
LoadLibraryW
GetConsoleAliasExesLengthW
GetStringTypeExW
GetFileAttributesA
WriteConsoleW
GetOverlappedResult
GetVolumePathNameA
RaiseException
GlobalUnfix
GetStdHandle
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
RemoveDirectoryA
VerLanguageNameW
PrepareTape
LoadLibraryA
LocalAlloc
SetCalendarInfoW
AddAtomW
SetThreadIdealProcessor
GetModuleFileNameA
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
SetLocaleInfoW
lstrcatW
FreeEnvironmentStringsW
GetStringTypeW
SetThreadAffinityMask
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
EnumSystemLocalesW
DeleteFileA
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MoveFileA
HeapFree
HeapAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
WriteFile
GetModuleFileNameW
HeapSize
CloseHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CreateFileW
Sections
.text Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cuxawur Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ