Static task
static1
Behavioral task
behavioral1
Sample
b3723862fc454235ca90a793c0dc00c15914430aa262b3926ddf634fab945111.exe
Resource
win10v2004-20230221-en
General
-
Target
b3723862fc454235ca90a793c0dc00c15914430aa262b3926ddf634fab945111
-
Size
489KB
-
MD5
cc2d374232c3aece18cf0414159825ea
-
SHA1
aba7cff292bc6e9d6825d6c62779528541abd922
-
SHA256
b3723862fc454235ca90a793c0dc00c15914430aa262b3926ddf634fab945111
-
SHA512
7031dd0903351914dbbedda192fbcff37d6a972b05a03f8f0a77c8153c3a6c89eeb66bac43b53eac1a491b587549e13985ff392ec756a08d53fc974824e887a1
-
SSDEEP
6144:d/r03jUsx+MATKyj5EeHuiwMOxb4EksVpNHyGQbVP8Y3WPcFygw93:djOjVxAOylEeHuiwVHk2pNbQbNZTw93
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3723862fc454235ca90a793c0dc00c15914430aa262b3926ddf634fab945111
Files
-
b3723862fc454235ca90a793c0dc00c15914430aa262b3926ddf634fab945111.exe windows x86
4bf83d17e4fe6ebaf744a99be88735bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
GetSystemWindowsDirectoryW
FreeEnvironmentStringsA
GetProcessPriorityBoost
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
GetVolumePathNameW
GetPrivateProfileIntA
GetSystemPowerStatus
GetCalendarInfoA
GetProcessHandleCount
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetFileAttributesW
GetModuleFileNameW
GetShortPathNameA
DeleteFiber
GetProcAddress
HeapSize
MoveFileW
SetComputerNameA
SearchPathA
GetDiskFreeSpaceW
InterlockedIncrement
LoadLibraryA
WriteConsoleA
GetProcessId
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
SetCalendarInfoW
MoveFileA
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
AddAtomW
OpenJobObjectW
GetPrivateProfileStructA
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
CreateMutexA
FindNextFileW
GetConsoleTitleW
EnumDateFormatsW
CompareStringA
GetShortPathNameW
SetFileShortNameA
FindAtomW
GetVolumeNameForVolumeMountPointW
DeleteFileW
EnumSystemLocalesW
AreFileApisANSI
GetDriveTypeW
OpenWaitableTimerA
GetStringTypeA
GetLastError
HeapFree
DeleteFileA
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
EnterCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
WriteConsoleW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 305KB - Virtual size: 40.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ