Static task
static1
Behavioral task
behavioral1
Sample
42c7a141ce336409f8ed457c4c7873e27bc29e34a797c786babcd9c4cac5f287.exe
Resource
win10v2004-20230220-en
General
-
Target
42c7a141ce336409f8ed457c4c7873e27bc29e34a797c786babcd9c4cac5f287
-
Size
315KB
-
MD5
a3e62094faaf3319cb4cf92edcd70022
-
SHA1
804723f9c5c8674b291fde5b4bba4ea95d99bda2
-
SHA256
42c7a141ce336409f8ed457c4c7873e27bc29e34a797c786babcd9c4cac5f287
-
SHA512
56e6971f8d501579b9c8b4cbb0fcd5bd002928c23a66499565cf53c8d6d9dbcd439664d71271a610241e0ee4f8aec7fa7721e02e475f07bcd7e36ddd24a70aa2
-
SSDEEP
3072:IzWSacQwJOzCA27ophWwu60t5r5MwA22Trfs8USeo83Qot0K/WmJt:Iz+cQs4qohu60t5CwRQUMDfnmJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42c7a141ce336409f8ed457c4c7873e27bc29e34a797c786babcd9c4cac5f287
Files
-
42c7a141ce336409f8ed457c4c7873e27bc29e34a797c786babcd9c4cac5f287.exe windows x86
38174083713e590cf897cdb95c1ddaa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
SetProcessPriorityBoost
GetVolumePathNameW
GetPrivateProfileIntA
GetPrivateProfileStructW
GetSystemPowerStatus
GetCalendarInfoA
GetProcessHandleCount
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetFileAttributesA
GetFileAttributesW
GetModuleFileNameW
GetProcAddress
MoveFileW
SetComputerNameA
SearchPathA
ConvertThreadToFiber
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
MoveFileA
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
GetDiskFreeSpaceA
OpenJobObjectW
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
FindNextFileW
GetStringTypeW
GetConsoleTitleW
EnumDateFormatsW
CompareStringA
GetShortPathNameW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
FindAtomW
GetVolumeNameForVolumeMountPointW
DeleteFileW
EnumSystemLocalesW
AreFileApisANSI
GetDriveTypeW
OpenWaitableTimerA
CreateMutexW
WideCharToMultiByte
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLastError
HeapFree
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
LoadLibraryW
WriteConsoleW
CreateFileW
CloseHandle
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 80KB - Virtual size: 40.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ