Static task
static1
Behavioral task
behavioral1
Sample
ba115c5fad7b897a6d2f76aa8b65530c272b1b5ea14538d2c303478e1784ddaa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ba115c5fad7b897a6d2f76aa8b65530c272b1b5ea14538d2c303478e1784ddaa.exe
Resource
win10v2004-20230220-en
General
-
Target
ba115c5fad7b897a6d2f76aa8b65530c272b1b5ea14538d2c303478e1784ddaa
-
Size
2.5MB
-
MD5
eb370563b21120f59dc83898c9b08a84
-
SHA1
4736e4b3b21c0a3a133244b07307308020381835
-
SHA256
ba115c5fad7b897a6d2f76aa8b65530c272b1b5ea14538d2c303478e1784ddaa
-
SHA512
ea7505b7c07b54d2b0772c244e363c027e53b0642bf357899ca5a37a0ed86abb720d8f00f25bfe79f804e3159f870b555f0639a723dfdad4b958cfe685bb911e
-
SSDEEP
49152:/CU9UaEo2+gDs6sWs6KczpGRY9AHyDBDjMo0mHMB8/sAH1hwI8b0llyYDLBK:/+o2VfU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba115c5fad7b897a6d2f76aa8b65530c272b1b5ea14538d2c303478e1784ddaa
Files
-
ba115c5fad7b897a6d2f76aa8b65530c272b1b5ea14538d2c303478e1784ddaa.exe windows x64
a5d9c2ce025206d93665949648b5e519
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteConsoleW
SetEndOfFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
SetEnvironmentVariableA
HeapSize
IsDebuggerPresent
WriteFile
ReadFile
FreeLibrary
GetProcAddress
HeapFree
GetProcessHeap
GetModuleHandleA
GetLastError
WideCharToMultiByte
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwindEx
RtlPcToFileHeader
RaiseException
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapAlloc
HeapReAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
GetTimeZoneInformation
user32
EnumChildWindows
rpcrt4
UuidFromStringA
Sections
.text Size: 1022KB - Virtual size: 1021KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 533KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ