Static task
static1
Behavioral task
behavioral1
Sample
49def58b6d715af7c26bc27faeb4e3f8f0f97b9d4a50dc1f1c12cd65791657d8.exe
Resource
win10v2004-20230220-en
General
-
Target
49def58b6d715af7c26bc27faeb4e3f8f0f97b9d4a50dc1f1c12cd65791657d8
-
Size
750KB
-
MD5
85ed24cbf6a15f2643c3fcd2a7171759
-
SHA1
d8357c6b2620f2f3695409bf6b650e84eebed0d7
-
SHA256
49def58b6d715af7c26bc27faeb4e3f8f0f97b9d4a50dc1f1c12cd65791657d8
-
SHA512
2c248c6f6b5eb6231817f24839d5e4d23c96ffe096b07f3795900ecd7cc5d0e568b51c630b105286dd0a714b88688b2ab1d9e974c704faec430209eeafdc376e
-
SSDEEP
12288:X5PG9M5//MIpGA7SsJ9hXKc4Q/h0JwRB1o1cwcKuFzM2aetUHymN:X5PB/McGbsJnX/4QZy0B1oqwzKgeeH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 49def58b6d715af7c26bc27faeb4e3f8f0f97b9d4a50dc1f1c12cd65791657d8
Files
-
49def58b6d715af7c26bc27faeb4e3f8f0f97b9d4a50dc1f1c12cd65791657d8.exe windows x86
73f55c9a8ec43dc84ad4d9211db141b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
SetMailslotInfo
GetSystemWindowsDirectoryW
FreeEnvironmentStringsA
GetProcessPriorityBoost
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
GetDriveTypeA
GetProcessTimes
GetVolumePathNameW
GetCalendarInfoA
GetFileAttributesA
WriteConsoleW
SetSystemPowerState
GetModuleFileNameW
CompareStringW
GetShortPathNameA
EnumSystemLocalesA
GetPrivateProfileIntW
DeleteFiber
GetLastError
GetProcAddress
InterlockedIncrement
HeapSize
SetComputerNameA
EnterCriticalSection
SearchPathA
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
GetProcessId
LocalAlloc
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
IsSystemResumeAutomatic
AddAtomW
OpenJobObjectW
GetPrivateProfileStructA
FindFirstVolumeMountPointA
EnumDateFormatsA
CreateIoCompletionPort
GetModuleHandleA
CancelTimerQueueTimer
FreeEnvironmentStringsW
FindNextFileW
SetFileShortNameA
FindAtomW
AreFileApisANSI
GetConsoleAliasExesLengthA
AttachConsole
GetVolumeNameForVolumeMountPointA
HeapFree
DeleteFileA
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetModuleFileNameA
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
GetConsoleCP
GetConsoleMode
RtlUnwind
SetStdHandle
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsA
SelectObject
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 595KB - Virtual size: 41.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ