Static task
static1
Behavioral task
behavioral1
Sample
a28f84ee814a953877b928db08d5938af43551de47060089092778e5d60a8191.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a28f84ee814a953877b928db08d5938af43551de47060089092778e5d60a8191.exe
Resource
win10v2004-20230221-en
General
-
Target
a28f84ee814a953877b928db08d5938af43551de47060089092778e5d60a8191
-
Size
3.1MB
-
MD5
57515de20b2afca3447c6d4657c5be8c
-
SHA1
26ed9a97ae5ce39532cc46deae1183a6458238b5
-
SHA256
a28f84ee814a953877b928db08d5938af43551de47060089092778e5d60a8191
-
SHA512
02bc4db5adfa67a2d25b0bbff44beaffd360b04a31ff385fc5c901d9b33ef50aba4cef9dfde93ddf132206e5dcf74b97efc49e56fb6b9e141a6c6c6646ab8c9a
-
SSDEEP
49152:ecl0IZT2sdgIKpX9kx/GOigTOx8J5l4W3G:Dvh60/GZx8J5vG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a28f84ee814a953877b928db08d5938af43551de47060089092778e5d60a8191
Files
-
a28f84ee814a953877b928db08d5938af43551de47060089092778e5d60a8191.exe windows x64
6bd81aceba714b82bae2cbf200329b22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WinExec
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
CloseHandle
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
WideCharToMultiByte
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
lstrlenA
LocalFree
HeapFree
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
GetProcAddress
GetModuleHandleW
ExitProcess
HeapAlloc
GetCommandLineA
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
HeapSetInformation
GetVersion
HeapCreate
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
HeapReAlloc
HeapSize
GetUserDefaultLCID
advapi32
GetLengthSid
SetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
ole32
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ