Static task
static1
Behavioral task
behavioral1
Sample
dcb009fb8c9b7209c66d57c642648a051127207198152ec878059b259be44ea5.exe
Resource
win10v2004-20230220-en
General
-
Target
dcb009fb8c9b7209c66d57c642648a051127207198152ec878059b259be44ea5
-
Size
713KB
-
MD5
4b6ba60add9fa7f7f9c722210bdea554
-
SHA1
a12b3f89588f330e4a09330fbaf276b947adcc4f
-
SHA256
dcb009fb8c9b7209c66d57c642648a051127207198152ec878059b259be44ea5
-
SHA512
2310f058f5a4fd2a047ee02d8bfba97a61e1f04f891e81245d782799cbf91379d9e9350e2bf49098934920fdba503cd234f059ddb7c49e3c9cca17267d4026ea
-
SSDEEP
12288:mHqXmZKAb8PEYVEfQdN0SIFc/cnXbPP/XEe3bLx6IFOvg5megNJ1:5mZ21Ef4DIFcEnXbPvN3bLMjvgg1NJ1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcb009fb8c9b7209c66d57c642648a051127207198152ec878059b259be44ea5
Files
-
dcb009fb8c9b7209c66d57c642648a051127207198152ec878059b259be44ea5.exe windows x86
91e52b5b5b8df9c17be98b9e4559a03d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetDriveTypeW
GlobalCompact
InterlockedIncrement
InterlockedDecrement
HeapFree
InterlockedCompareExchange
OpenSemaphoreA
FreeEnvironmentStringsA
GetProcessPriorityBoost
GetTickCount
GetSystemTimeAsFileTime
EnumTimeFormatsA
GetVolumePathNameW
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
GetConsoleAliasExesLengthW
InitAtomTable
GetModuleFileNameW
lstrcatA
MultiByteToWideChar
GetStringTypeExA
GetProfileIntA
DeleteFiber
SearchPathW
GetCurrentDirectoryW
GetProcAddress
CreateJobSet
RemoveDirectoryA
SetComputerNameA
GetLocalTime
WriteConsoleA
InterlockedExchangeAdd
SetCalendarInfoW
FindFirstVolumeMountPointW
SetFileApisToANSI
AddAtomA
CreateIoCompletionPort
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
VirtualProtect
CompareStringA
FileTimeToLocalFileTime
GetVolumeNameForVolumeMountPointW
DeleteFileW
MoveFileWithProgressW
GetFileInformationByHandle
EnumSystemLocalesW
GetLastError
GetVolumeNameForVolumeMountPointA
CreateFileW
SetStdHandle
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MoveFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetLocaleInfoW
IsProcessorFeaturePresent
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleW
DeleteFileA
gdi32
GetCharABCWidthsA
winhttp
WinHttpGetProxyForUrl
Sections
.text Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 615KB - Virtual size: 3.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ