Static task
static1
Behavioral task
behavioral1
Sample
97c71e5a2800a340deda33eab2c85cd7e06201745700fe5add40b84572b0c46c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
97c71e5a2800a340deda33eab2c85cd7e06201745700fe5add40b84572b0c46c.exe
Resource
win10-20230220-en
General
-
Target
97c71e5a2800a340deda33eab2c85cd7e06201745700fe5add40b84572b0c46c
-
Size
198KB
-
MD5
6768db735cdff69b788f0f19b2e3a520
-
SHA1
37d7e8ab70eb1e649e3f50bec0d0f58ded5d0cda
-
SHA256
97c71e5a2800a340deda33eab2c85cd7e06201745700fe5add40b84572b0c46c
-
SHA512
43d37daa2ca5c279c0d72abe1a03fa6cca0c2c73d5ddfa69c3771d0887a40cc20506de5c132690e60308927d06cd1e7c805238fee45f822a6dfdbc0da038d4a8
-
SSDEEP
3072:V0Zhg/2yMRHAyFVqVzM3nYA69li8+BqN8GEdN0b+96L:eZw2r+iVqdM3QzNl+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97c71e5a2800a340deda33eab2c85cd7e06201745700fe5add40b84572b0c46c
Files
-
97c71e5a2800a340deda33eab2c85cd7e06201745700fe5add40b84572b0c46c.exe windows x86
554b97b4ca75d054417a17a8c740d1a8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesLengthA
InterlockedIncrement
OpenJobObjectA
WaitNamedPipeA
GetCurrentProcess
SetMailslotInfo
WritePrivateProfileSectionA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
SetFileTime
GetDriveTypeA
GlobalAlloc
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
GetSystemPowerStatus
GetCalendarInfoA
GetFileAttributesA
GetFileAttributesW
TerminateProcess
GetVolumePathNameA
GetShortPathNameA
GetPrivateProfileIntW
DeleteFiber
GetLogicalDriveStringsA
GetProcAddress
CreateMutexW
MoveFileW
SetComputerNameA
EnterCriticalSection
SearchPathA
OpenThread
WriteConsoleA
InterlockedExchangeAdd
OpenWaitableTimerW
DeleteTimerQueue
FindFirstVolumeMountPointW
AddAtomW
SetFileApisToANSI
BeginUpdateResourceA
GetDiskFreeSpaceA
GetPrivateProfileStructA
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
GetCurrentDirectoryA
CompareStringA
GetShortPathNameW
SetCalendarInfoA
SetThreadAffinityMask
GetWindowsDirectoryW
EnumCalendarInfoExA
EnumSystemLocalesW
DeleteFileA
SetProcessAffinityMask
AttachConsole
GetVolumeNameForVolumeMountPointA
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
LeaveCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WriteConsoleW
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CloseHandle
CreateFileW
gdi32
SelectPalette
GetCharABCWidthsA
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 79KB - Virtual size: 541KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xedezej Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ