Static task
static1
Behavioral task
behavioral1
Sample
781b0834307644f14046dd52d.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
781b0834307644f14046dd52d.exe
Resource
win10v2004-20230621-en
General
-
Target
781b0834307644f14046dd52d.exe
-
Size
433KB
-
MD5
781b0834307644f14046dd52d715ce37
-
SHA1
c3fa9c1c65a6c44cc152315ba70e59a9062b9935
-
SHA256
4997b19ed2d5a3e06598efc01500219a1d858eb48d79b7c867842e73466ba376
-
SHA512
74cc3581f17c9e0826040c6f767f4b636ddffcf7a785902f8c4854dc24894f97aefd436a705cfd734da3c9e272d4ae38fbb4d3f5c52896963cabe210659bac9a
-
SSDEEP
6144:vS2xgTTGqGioxIqQVhn7rIY8DJ4kXh1JS3/NrLtYGFpjcCmLTUI:v7OTGlTK7jrKJlXhzSBLtYCwf3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 781b0834307644f14046dd52d.exe
Files
-
781b0834307644f14046dd52d.exe.exe windows x86
4cb73e7166b3b7d1d1133e9f0d5a861b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesW
SearchPathW
GetConsoleAliasesLengthW
InterlockedIncrement
OpenJobObjectA
InterlockedDecrement
WaitNamedPipeA
WriteConsoleInputA
FreeEnvironmentStringsA
GetTickCount
GetCurrentThread
ConvertFiberToThread
EnumTimeFormatsW
GetCommandLineA
GetPriorityClass
GlobalAlloc
LoadLibraryW
FreeConsole
GetCalendarInfoA
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetExitCodeProcess
CreateSemaphoreA
GetFileAttributesW
WriteConsoleW
GetCompressedFileSizeA
GetVolumePathNameA
CreateMailslotW
EnumSystemLocalesA
InterlockedExchange
GetCPInfoExW
GetLastError
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
MoveFileW
GlobalGetAtomNameA
SearchPathA
SetFileAttributesA
GlobalFree
GetTempFileNameA
OpenWaitableTimerA
LoadLibraryA
OpenThread
SetCalendarInfoW
GetNumberFormatW
VirtualLock
AddAtomA
HeapWalk
OpenJobObjectW
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
GetCurrentDirectoryA
CompareStringA
WaitForDebugEvent
GetShortPathNameW
GetCPInfoExA
SetFileShortNameA
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
GetFileInformationByHandle
ReadConsoleOutputCharacterW
OpenFileMappingA
LocalFileTimeToFileTime
CreateFileW
CloseHandle
MoveFileA
WideCharToMultiByte
MultiByteToWideChar
HeapReAlloc
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
HeapCreate
SetFilePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
GetStringTypeW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
ReadFile
user32
GetAltTabInfoA
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 249KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bejuyon Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ