Static task
static1
Behavioral task
behavioral1
Sample
ba832eafef4b81af020933796051101e1f689ab15f25250380887c6d1b06b97c.exe
Resource
win10v2004-20230220-en
General
-
Target
ba832eafef4b81af020933796051101e1f689ab15f25250380887c6d1b06b97c
-
Size
245KB
-
MD5
680b7866c5113a58249654be736891eb
-
SHA1
58f687bf530668882f0765b943a85a49d3a744dd
-
SHA256
ba832eafef4b81af020933796051101e1f689ab15f25250380887c6d1b06b97c
-
SHA512
0ee0fefdb732ce24355d7455714897e01f7e685779c1cb4ffa4100e223cf75da1199af94560d90b3090d05e7a779c9b85d635e8c34b835228df8e518c18943e0
-
SSDEEP
3072:X9x6m35l3NzkfCg4DSy1UAzrJA3D9LWAf52+qhVp1:tsu57z1g4OqrJS9SAAp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ba832eafef4b81af020933796051101e1f689ab15f25250380887c6d1b06b97c
Files
-
ba832eafef4b81af020933796051101e1f689ab15f25250380887c6d1b06b97c.exe windows x86
ed6a070bf0eed3feda93e1f7e2ff5c98
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsW
WaitForSingleObject
InterlockedCompareExchange
AddConsoleAliasW
GetModuleHandleW
GetTickCount
GenerateConsoleCtrlEvent
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetConsoleAliasExesW
GetDateFormatA
SetCommTimeouts
GetPriorityClass
FindResourceExA
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
FreeConsole
GetCalendarInfoA
GetVersionExW
GlobalFlags
GetModuleFileNameW
CreateActCtxA
GetNumberOfConsoleInputEvents
DeactivateActCtx
OpenMutexW
GetLastError
GetCurrentDirectoryW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
WriteConsoleA
GetNumberFormatW
GetCurrentConsoleFont
FindAtomA
GetModuleFileNameA
FindFirstVolumeMountPointA
OpenFileMappingW
VirtualProtect
WaitForDebugEvent
GetCurrentThreadId
ReadConsoleOutputCharacterW
FindNextVolumeA
CloseHandle
WritePrivateProfileStructA
GetACP
CreateMutexW
CreateFileA
FlushFileBuffers
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
WideCharToMultiByte
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
CharUpperBuffW
LoadMenuW
GetCaretPos
gdi32
GetCharacterPlacementW
advapi32
GetEventLogInformation
winhttp
WinHttpCheckPlatform
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 33.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ