Static task
static1
Behavioral task
behavioral1
Sample
761ddc943a88d0d0888ac5a46abce823808a82c6185abd178a0a102097c1fa32.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
761ddc943a88d0d0888ac5a46abce823808a82c6185abd178a0a102097c1fa32.exe
Resource
win10v2004-20230220-en
General
-
Target
761ddc943a88d0d0888ac5a46abce823808a82c6185abd178a0a102097c1fa32
-
Size
138KB
-
MD5
caf0cdd6aa7a3926a3b7981909aab1f0
-
SHA1
0fe7e12b0692d5b059d32d24e1c0c3933b1867f3
-
SHA256
cddfaa1565f88a0bfbfba3d9aa8c89e4a0bb43504e071ea4402504416f038ee2
-
SHA512
3156c4107b66e703e3f8dd9ae9d83e7f3fa6e191051eaba953891543a6839d935a149e76a6cda05783f46574ea0ed59292bd444e8da986e067cf5f8c618f0589
-
SSDEEP
3072:7AXyI4frsEglSPbB8100/aDgW1V7zBVEEuTbb1r9Xc:7AiI8gEgwPbW1h/avL7zB2EKbbg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/761ddc943a88d0d0888ac5a46abce823808a82c6185abd178a0a102097c1fa32
Files
-
761ddc943a88d0d0888ac5a46abce823808a82c6185abd178a0a102097c1fa32.zip
-
761ddc943a88d0d0888ac5a46abce823808a82c6185abd178a0a102097c1fa32.exe windows x86
7f87b3efdf116f7ab8f1afe2047eb9b9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ConvertThreadToFiber
GetConsoleAliasExesLengthA
InterlockedIncrement
OpenJobObjectA
InterlockedDecrement
SetMailslotInfo
GetLogicalDriveStringsW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
GetDriveTypeA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
GetCalendarInfoA
LeaveCriticalSection
GetFileAttributesA
GetExitCodeProcess
GetFileAttributesW
SetSystemPowerState
WritePrivateProfileSectionW
CompareStringW
GetVolumePathNameA
GetShortPathNameA
GetPrivateProfileIntW
CreateMutexW
GetProcAddress
AttachConsole
MoveFileW
SetComputerNameA
SearchPathA
OpenThread
WriteConsoleA
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
SetCalendarInfoW
MoveFileA
FindFirstVolumeMountPointW
AddAtomW
SetFileApisToANSI
GetDiskFreeSpaceA
GetPrivateProfileStructA
FindFirstVolumeMountPointA
GetModuleHandleA
CancelTimerQueueTimer
FreeEnvironmentStringsW
FindNextFileW
GetStringTypeW
EnumDateFormatsW
SetThreadAffinityMask
GetCurrentProcessId
EnumSystemLocalesW
DeleteFileA
SetProcessAffinityMask
GetCurrentDirectoryW
GetVolumeNameForVolumeMountPointA
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
FlushFileBuffers
SetStdHandle
WriteConsoleW
MultiByteToWideChar
LCMapStringW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 542KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ