Static task
static1
Behavioral task
behavioral1
Sample
a9956f51ea1da54a633f1490c0b941fa471677c804216af850a7f03a2fbff4c8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a9956f51ea1da54a633f1490c0b941fa471677c804216af850a7f03a2fbff4c8.exe
Resource
win10-20230703-en
General
-
Target
a9956f51ea1da54a633f1490c0b941fa471677c804216af850a7f03a2fbff4c8
-
Size
789KB
-
MD5
1be4cded826451a64fd058aed1f5bbc9
-
SHA1
3aca1d74a3aef8acd38007285328bb0c73033c03
-
SHA256
a9956f51ea1da54a633f1490c0b941fa471677c804216af850a7f03a2fbff4c8
-
SHA512
72c55ff6fd5d5b3f08b6c51eb5c8550cb7099d166450800b47ab55ea836c0c8fd0efbc641cc3f6ed45088c2a4dd41e6d52a03df2993b34b2332c7f386349cf7b
-
SSDEEP
12288:7xN+dgeZ9Pe+9oPsT5/SNxLzey+o69FF1XZdvFOrdAYgzyMZiatCpOdv:yN/yP8SNKDFzZd4rizWOdv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9956f51ea1da54a633f1490c0b941fa471677c804216af850a7f03a2fbff4c8
Files
-
a9956f51ea1da54a633f1490c0b941fa471677c804216af850a7f03a2fbff4c8.exe windows x86
1ef9b36848c22fc248776468fce46241
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetProfileIntW
GetSystemWindowsDirectoryW
GetComputerNameW
CreateHardLinkA
LockFile
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
GetDateFormatA
FindResourceExA
ReadConsoleInputA
_hread
GetVersionExW
EnumSystemCodePagesA
FindNextVolumeW
Beep
GetVolumePathNameA
ReplaceFileA
DisconnectNamedPipe
FlushFileBuffers
SetCurrentDirectoryA
FindFirstFileA
SetLocaleInfoA
GetLastError
SetLastError
lstrcmpiA
GetProcAddress
GetLongPathNameA
EnumDateFormatsExA
HeapUnlock
CopyFileA
LoadLibraryA
LocalAlloc
BeginUpdateResourceA
SetProcessWorkingSetSize
CreateMutexA
VirtualProtect
GetVersionExA
GetWindowsDirectoryW
FileTimeToLocalFileTime
lstrcpyA
CloseHandle
CreateFileA
GetModuleHandleA
WriteConsoleW
GetConsoleOutputCP
OpenMutexW
FindResourceA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
GetStartupInfoW
HeapFree
RtlUnwind
RaiseException
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
WideCharToMultiByte
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
user32
CharUpperBuffW
GetMenuBarInfo
CharLowerBuffW
DdeQueryStringA
GetClipboardOwner
CharToOemBuffA
advapi32
LogonUserW
Sections
.text Size: 650KB - Virtual size: 650KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ