Static task
static1
Behavioral task
behavioral1
Sample
b54abc405dd25ee25d51af54b371ce0a7e7b7a926a7df391f22f4aa7f7592795.exe
Resource
win10-20230220-en
General
-
Target
b54abc405dd25ee25d51af54b371ce0a7e7b7a926a7df391f22f4aa7f7592795
-
Size
284KB
-
MD5
1110ed21b7f45dc45cb18111b54253e5
-
SHA1
2d2dd617417b2dfcd2968d8d31521ae955374800
-
SHA256
b54abc405dd25ee25d51af54b371ce0a7e7b7a926a7df391f22f4aa7f7592795
-
SHA512
15ccdcac1a80e2fd47dbdeab7df4dc8b49141965286968e7534a7db0b083ceb7d3b67f858eb8873e81d0a3d16635f9a67816b0e7eacc3162cc740c018620312d
-
SSDEEP
3072:IBIo8XDQflEP5frfoeciXfm4LvXYXQVaIrXrZwloYxuEhFJxXLB:Il8zggZffLX2bSfcxt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b54abc405dd25ee25d51af54b371ce0a7e7b7a926a7df391f22f4aa7f7592795
Files
-
b54abc405dd25ee25d51af54b371ce0a7e7b7a926a7df391f22f4aa7f7592795.exe windows x86
60403da2a0544b3a7c47c1587b7aa0b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
GetDefaultCommConfigW
SetWaitableTimer
GetConsoleAliasA
InterlockedDecrement
GetLogicalDriveStringsW
CreateJobObjectW
InterlockedCompareExchange
AddConsoleAliasW
WaitForSingleObjectEx
GetFileAttributesExA
GetProcessPriorityBoost
GetModuleHandleW
GetTickCount
IsBadReadPtr
GetConsoleAliasesLengthA
GetConsoleTitleA
GetWindowsDirectoryA
CancelDeviceWakeupRequest
WriteFile
SetCommState
CreateActCtxW
InitializeCriticalSection
GlobalAlloc
GetLocaleInfoW
FatalAppExitW
_hread
GetVersionExW
GlobalFlags
AllocConsole
WritePrivateProfileStructW
FindNextVolumeW
MulDiv
ReplaceFileW
GetModuleFileNameW
GetStringTypeExA
GetStdHandle
OpenMutexW
GetLastError
ReadConsoleOutputCharacterA
GetProcAddress
AttachConsole
VirtualAlloc
GetTempFileNameA
LoadLibraryA
CreateFileMappingW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
FindAtomA
GetTapeParameters
FindFirstVolumeMountPointA
GetModuleHandleA
GetConsoleTitleW
WaitForDebugEvent
SetProcessShutdownParameters
_lopen
GetFileInformationByHandle
AddConsoleAliasA
PeekNamedPipe
lstrlenA
DnsHostnameToComputerNameW
SetThreadContext
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
user32
CharLowerBuffW
gdi32
GetCharWidthW
EnumFontsA
GetCharABCWidthsFloatW
Sections
.text Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ