Static task
static1
Behavioral task
behavioral1
Sample
de71b0cbedba44772070db6f161b3892b4ff8c6b61fde146bb45b798c54cedfa.exe
Resource
win10v2004-20230220-en
General
-
Target
de71b0cbedba44772070db6f161b3892b4ff8c6b61fde146bb45b798c54cedfa
-
Size
3.4MB
-
MD5
5adcd2cf9659086d421ecf4fbeb3b213
-
SHA1
58c2eb29293feabec3e325bd6d4859e6d42bb3a8
-
SHA256
de71b0cbedba44772070db6f161b3892b4ff8c6b61fde146bb45b798c54cedfa
-
SHA512
104d67c69a76fcc9d50bcb5738d8e9941cf3d6f99c88e19071a6141571da8d3a1ff3a030e33e4adf00b0a87eed2140027272e4b61c12d0ea73a8619db3adb681
-
SSDEEP
49152:CIuZHB99zB1ZO3rzZkLdSRIhOGsmXsTnnKHvXU4KERWFgYc3BYNhNSM3oT+OWb3y:4ZhBO7dDyuK84zWFQY6M4T+59hN1k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de71b0cbedba44772070db6f161b3892b4ff8c6b61fde146bb45b798c54cedfa
Files
-
de71b0cbedba44772070db6f161b3892b4ff8c6b61fde146bb45b798c54cedfa.exe windows x86
f4492804ef800c5af0eb5787c534d586
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
GetCommState
ReadConsoleA
InterlockedDecrement
CreateJobObjectW
InterlockedCompareExchange
AddConsoleAliasW
GetProcessPriorityBoost
GetConsoleAliasesLengthA
GetConsoleTitleA
GetWindowsDirectoryA
InitializeCriticalSection
GlobalAlloc
IsValidLocale
GetLocaleInfoW
FatalAppExitW
IsBadCodePtr
GetSystemWindowsDirectoryA
GetVersionExW
GlobalFlags
FindNextVolumeW
GetConsoleAliasW
ReplaceFileW
IsDBCSLeadByte
CreateActCtxA
GetTempPathW
GetStringTypeExA
AllocConsole
GetStdHandle
GetLogicalDriveStringsA
OpenMutexW
GetLastError
BindIoCompletionCallback
GetProcAddress
AttachConsole
VirtualAlloc
GetTempFileNameA
LoadLibraryA
DnsHostnameToComputerNameA
CreateFileMappingW
VirtualLock
GetTapeParameters
GetModuleFileNameA
GetDefaultCommConfigA
FindFirstVolumeMountPointA
GetModuleHandleA
HeapSetInformation
GetConsoleTitleW
WaitForDebugEvent
_lopen
FindAtomW
AddConsoleAliasA
ReadConsoleOutputCharacterW
EnumCalendarInfoExA
lstrlenA
GetDateFormatW
SetThreadContext
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
InitializeCriticalSectionAndSpinCount
user32
CharLowerBuffW
gdi32
GetCharWidthW
GetCharABCWidthsFloatW
EnumFontsA
Sections
.text Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ