Static task
static1
Behavioral task
behavioral1
Sample
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe
Resource
win10v2004-20230220-en
General
-
Target
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe
-
Size
241KB
-
MD5
7d726c8be35f9e9f010363c050ee86b3
-
SHA1
13d73cea5b8d05b338f347cdfc4088cc4f38fcac
-
SHA256
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027
-
SHA512
a99fd000bf852276d2722e7e75b9577dbac669a12c7db9e52965808aabc7710bfa3956de993f14154143db45ad124f4ed90255332171bb4df57c30707e0a042b
-
SSDEEP
3072:O98WPLTgdxkBH8ZQYTr6DQ6v+UT4i0JKIMuFes7P:XWzcdxkFhCwQC8bMuF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe
Files
-
b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027.exe.exe windows x86
0e4b3a5d9cc3d6ed1b5c0b9f8a440aa6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConvertThreadToFiber
GetConsoleAliasExesLengthA
InterlockedIncrement
OpenJobObjectA
InterlockedDecrement
SetMailslotInfo
GetLogicalDriveStringsW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
GetDriveTypeA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
GetCalendarInfoA
LeaveCriticalSection
GetFileAttributesA
GetExitCodeProcess
GetFileAttributesW
WriteConsoleW
SetSystemPowerState
WritePrivateProfileSectionW
CompareStringW
GetVolumePathNameA
CreateMutexW
GetPrivateProfileIntW
GetCurrentDirectoryW
GetProcAddress
AttachConsole
MoveFileW
SetComputerNameA
SearchPathA
OpenThread
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
SetCalendarInfoW
MoveFileA
FindFirstVolumeMountPointW
AddAtomW
SetFileApisToANSI
GetDiskFreeSpaceA
GetPrivateProfileStructA
FindFirstVolumeMountPointA
GetModuleHandleA
CancelTimerQueueTimer
FreeEnvironmentStringsW
FindNextFileW
SetThreadAffinityMask
DeleteFileW
GetCurrentProcessId
EnumSystemLocalesW
SetProcessAffinityMask
GetShortPathNameA
GetVolumeNameForVolumeMountPointA
GetLastError
HeapFree
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
FlushFileBuffers
SetStdHandle
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 540KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ