Static task
static1
Behavioral task
behavioral1
Sample
a4b17f40f8f17778ff92b8072a9c47b0546ec771766b63c62d7e6142125695fe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
a4b17f40f8f17778ff92b8072a9c47b0546ec771766b63c62d7e6142125695fe.exe
Resource
win10v2004-20230703-en
General
-
Target
a4b17f40f8f17778ff92b8072a9c47b0546ec771766b63c62d7e6142125695fe
-
Size
868KB
-
MD5
e908a483e493c40c7bb6fdf52850dbb6
-
SHA1
58b232335e11479a8a1407c2513a1ee96de02d70
-
SHA256
a4b17f40f8f17778ff92b8072a9c47b0546ec771766b63c62d7e6142125695fe
-
SHA512
155976dc49918a6a2500d563470659bb0d97722321b725b04cb499e56886719755610d1faa7a796705497d2efa94f1909a743c47741e6eafc1a8d2349b3b9b7f
-
SSDEEP
24576:ZroVbew5J62KmO+j28mD4SsXnDhWqiDTyTNv7F:xoVbeuxITs3AqiDTyTNv7F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4b17f40f8f17778ff92b8072a9c47b0546ec771766b63c62d7e6142125695fe
Files
-
a4b17f40f8f17778ff92b8072a9c47b0546ec771766b63c62d7e6142125695fe.exe windows x64
aeab035868ba2cf710a371625433f11f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileW
SetFileInformationByHandle
VirtualAlloc
VirtualFree
VirtualQuery
GetSystemInfo
GetProcAddress
FlushInstructionCache
VirtualProtect
HeapCreate
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
GetLastError
GetThreadContext
SetThreadContext
SuspendThread
ResumeThread
Sleep
GetModuleFileNameW
CreateToolhelp32Snapshot
Thread32First
Thread32Next
VirtualProtectEx
GetProcessHeaps
HeapWalk
CreateThread
WaitForSingleObject
LoadResource
SizeofResource
GetModuleFileNameA
FindResourceA
DeleteFileA
CopyFileA
GetConsoleWindow
ReadConsoleW
WriteConsoleW
HeapSize
SetFilePointerEx
ReadFile
GetConsoleMode
GetModuleHandleW
CloseHandle
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlPcToFileHeader
RaiseException
RtlUnwindEx
FreeLibrary
LoadLibraryExW
TerminateProcess
QueryPerformanceFrequency
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
SetStdHandle
FlushFileBuffers
GetConsoleCP
user32
ShowWindow
shell32
ShellExecuteA
shlwapi
PathFileExistsW
PathRemoveFileSpecA
crypt32
CryptEnumOIDInfo
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 544B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 593KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ