Static task
static1
Behavioral task
behavioral1
Sample
215bc82434aab0c0c0fc59b8457ff42135771bd1669c171b365d996156e5e70a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
215bc82434aab0c0c0fc59b8457ff42135771bd1669c171b365d996156e5e70a.exe
Resource
win10v2004-20230220-en
General
-
Target
215bc82434aab0c0c0fc59b8457ff42135771bd1669c171b365d996156e5e70a
-
Size
622KB
-
MD5
03f1862472f961b64aee90c9791e28a9
-
SHA1
32b4c651bd20173336c02dc1e6ccd5148ad10357
-
SHA256
215bc82434aab0c0c0fc59b8457ff42135771bd1669c171b365d996156e5e70a
-
SHA512
147a85aa949b2c2e07061046abe6655435631c173654cf502fa94289ec80fc171e9d4e06569d8f19e8acc3abf081041e8af100ca017f1b19a141c4113007b846
-
SSDEEP
12288:ylmeA3pVB1jq3OgAO+hPP9cOSYxHN+TD:ylmeYDjq+9fbHC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 215bc82434aab0c0c0fc59b8457ff42135771bd1669c171b365d996156e5e70a
Files
-
215bc82434aab0c0c0fc59b8457ff42135771bd1669c171b365d996156e5e70a.exe windows x64
6bd81aceba714b82bae2cbf200329b22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WinExec
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
CloseHandle
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
WideCharToMultiByte
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
lstrlenA
LocalFree
HeapFree
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
GetProcAddress
GetModuleHandleW
ExitProcess
HeapAlloc
GetCommandLineA
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
HeapSetInformation
GetVersion
HeapCreate
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
HeapReAlloc
HeapSize
GetUserDefaultLCID
advapi32
GetLengthSid
SetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
ole32
CoInitializeSecurity
CoInitializeEx
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 427KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ