Static task
static1
Behavioral task
behavioral1
Sample
Malicious_d378f78c303ad68bdab12323461a5c3b37b930ee5c3d279e6471d9495adc5561.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_d378f78c303ad68bdab12323461a5c3b37b930ee5c3d279e6471d9495adc5561.exe
Resource
win10v2004-20230621-en
General
-
Target
Malicious_d378f78c303ad68bdab12323461a5c3b37b930ee5c3d279e6471d9495adc5561.exe
-
Size
110KB
-
MD5
83eefc1ea79edeae19620a939d7af9bb
-
SHA1
cdfb0eadf4ba470967a0e92c169308c69d35c67b
-
SHA256
d378f78c303ad68bdab12323461a5c3b37b930ee5c3d279e6471d9495adc5561
-
SHA512
f13e5844b3a8b91096d39601c4858926d577e2a625a13a243760e9d0b368c687d96b1be24897e881511e0a0e6637fa5498a23e3f3d0debe8cdc7fb0d035d2124
-
SSDEEP
3072:50IfGgTWK8sMJOzrmgTsP9hg+eU/D1XI9:5Rf/TeH4vHgPjgy/q9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_d378f78c303ad68bdab12323461a5c3b37b930ee5c3d279e6471d9495adc5561.exe
Files
-
Malicious_d378f78c303ad68bdab12323461a5c3b37b930ee5c3d279e6471d9495adc5561.exe.exe windows x64
e69a7cc74da6254ae84ffb8813ca5773
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetThreadContext
Process32First
OpenProcess
Thread32First
Thread32Next
GetLastError
VirtualAllocEx
GetThreadContext
Process32Next
IsDebuggerPresent
CreateToolhelp32Snapshot
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
OpenThread
ExitProcess
EncodePointer
DecodePointer
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
HeapSize
HeapFree
DeleteCriticalSection
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetStdHandle
WriteFile
GetModuleFileNameW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
GetCurrentThreadId
GetProcessHeap
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapReAlloc
LCMapStringW
OutputDebugStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
CreateFileW
advapi32
RegCreateKeyExA
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ