Static task
static1
Behavioral task
behavioral1
Sample
480ac3e784edcf2d35dc4ce76d41fcf4feeee58b2c848e38edd06a2f969ca53e.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
480ac3e784edcf2d35dc4ce76d41fcf4feeee58b2c848e38edd06a2f969ca53e.exe
Resource
win10v2004-20230621-en
General
-
Target
480ac3e784edcf2d35dc4ce76d41fcf4feeee58b2c848e38edd06a2f969ca53e
-
Size
2.4MB
-
MD5
20d3f7db7ddb19832a550bf69a87b166
-
SHA1
f136715653aecad66b5ef4123caecf127583c86e
-
SHA256
480ac3e784edcf2d35dc4ce76d41fcf4feeee58b2c848e38edd06a2f969ca53e
-
SHA512
03259e0771868a8abb9f2a2b647a909e991ff3d9096d16931acbcee9f3f436300b62f6dafaa5aad789ac7c5383093462c5d28ae3fed15c56408c7901191a723b
-
SSDEEP
24576:mWRW2KGdUk7oXv+PH+ZqEvIvbKGELcdQdRVwWXZw2gDK36QwqpdYq6lt1geP2Ri:wG+goXwLUQbYMMaYrgDC6QwSajlWRi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 480ac3e784edcf2d35dc4ce76d41fcf4feeee58b2c848e38edd06a2f969ca53e
Files
-
480ac3e784edcf2d35dc4ce76d41fcf4feeee58b2c848e38edd06a2f969ca53e.exe windows x64
a5d9c2ce025206d93665949648b5e519
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteConsoleW
SetEndOfFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
SetEnvironmentVariableA
HeapSize
IsDebuggerPresent
WriteFile
ReadFile
FreeLibrary
GetProcAddress
HeapFree
GetProcessHeap
GetModuleHandleA
GetLastError
WideCharToMultiByte
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RtlUnwindEx
RtlPcToFileHeader
RaiseException
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
GetModuleFileNameA
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
HeapAlloc
HeapReAlloc
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
GetTimeZoneInformation
user32
EnumChildWindows
rpcrt4
UuidFromStringA
Sections
.text Size: 1014KB - Virtual size: 1013KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 528KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ