Static task
static1
Behavioral task
behavioral1
Sample
02797f7558acb033fe4752db0cebe906.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02797f7558acb033fe4752db0cebe906.exe
Resource
win10v2004-20230220-en
General
-
Target
02797f7558acb033fe4752db0cebe906.exe
-
Size
291KB
-
MD5
02797f7558acb033fe4752db0cebe906
-
SHA1
a93385918326d8555172a14908980280bab3d2f4
-
SHA256
31c679761cde0dde6ca8218c6a3c372897800a3cbe5d4e6917b57c429c8010d3
-
SHA512
7e03d107cc0c8c23db2296cc2f22e97c361dfc0bba0e695addb83ecd9ef6ccfbe58cb48ed7feee0867bb96ea8a846e0a209afc51b7163b888d10ef458f42a748
-
SSDEEP
6144:FxbgNWD2l8sSdqSBESnNQePgwxK/k/49iAYuC2K:vkNWD2q3BBEqa2LU/tDC2K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02797f7558acb033fe4752db0cebe906.exe
Files
-
02797f7558acb033fe4752db0cebe906.exe.exe windows x86
5d1142e6b5dd917186b13ffa418932e3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
GetDriveTypeW
GetNumberOfConsoleInputEvents
GetConsoleAliasExesLengthA
InterlockedIncrement
SystemTimeToFileTime
EnumCalendarInfoW
SetDefaultCommConfigW
GetProfileSectionA
SetComputerNameW
CallNamedPipeW
MoveFileWithProgressA
GetTickCount
ReadConsoleW
SetCommState
GetDriveTypeA
SetHandleCount
GetVolumePathNameW
GetPrivateProfileIntA
LoadLibraryW
IsProcessInJob
FreeConsole
InterlockedPopEntrySList
GetFileAttributesA
CreateFileW
GetOverlappedResult
CompareStringW
GetStringTypeExA
EnumSystemLocalesA
GetProfileIntA
ReleaseActCtx
GetStdHandle
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
SetFirmwareEnvironmentVariableW
RemoveDirectoryA
VerLanguageNameW
SearchPathA
PrepareTape
GetTempFileNameA
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
AddAtomW
AddAtomA
GlobalWire
GetModuleFileNameA
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
lstrcatW
FreeEnvironmentStringsW
GetConsoleTitleW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
GlobalReAlloc
EnumSystemLocalesW
AreFileApisANSI
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MoveFileA
HeapFree
HeapAlloc
DeleteFileA
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetModuleFileNameW
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
CloseHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetEnvironmentStringsW
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleW
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jusiy Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ