Static task
static1
Behavioral task
behavioral1
Sample
b73ef06e30578a4f9144826d86b5e558ccda91cbf9ac9c9243239825398427a8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b73ef06e30578a4f9144826d86b5e558ccda91cbf9ac9c9243239825398427a8.exe
Resource
win10-20230703-en
General
-
Target
b73ef06e30578a4f9144826d86b5e558ccda91cbf9ac9c9243239825398427a8
-
Size
282KB
-
MD5
a9adeaf9c0b4d8e12a0d31e799736208
-
SHA1
55c57cb3c40d3c750112a8407d801828e0afcc67
-
SHA256
b73ef06e30578a4f9144826d86b5e558ccda91cbf9ac9c9243239825398427a8
-
SHA512
41c7209462b8b3407504db26d82a08af0a1ca69dc99341ec4f534c24ad8fc7fc933480963b668da9a9180fd5f59b165c5543daf98026087c5baa221dc8b4922d
-
SSDEEP
3072:crW2RnLTnfgY8xAVynj9/iDXFFiDCeZ3X0J3Qp5nTZIa9tbLLwTA0B:D2RnLTYwVyoDXFFdeZ3EJ3ITzsT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b73ef06e30578a4f9144826d86b5e558ccda91cbf9ac9c9243239825398427a8
Files
-
b73ef06e30578a4f9144826d86b5e558ccda91cbf9ac9c9243239825398427a8.exe windows x86
924121eeb402eb9f1b78bff58e5474f5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetProfileIntW
GetSystemWindowsDirectoryW
GetComputerNameW
CreateHardLinkA
LockFile
SetTapeParameters
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
GetDateFormatA
FindResourceExA
LoadLibraryW
ReadConsoleInputA
_hread
GetVersionExW
EnumSystemCodePagesA
FindNextVolumeW
GetVolumePathNameA
ReplaceFileA
DisconnectNamedPipe
FlushFileBuffers
FindFirstFileA
OpenMutexW
GetLastError
FindResourceA
lstrcmpiA
GetProcAddress
GetLongPathNameA
EnumDateFormatsExA
CopyFileA
LoadLibraryA
LocalAlloc
SetCurrentDirectoryW
BeginUpdateResourceA
SetProcessWorkingSetSize
HeapWalk
SetLocaleInfoW
CreateMutexA
VirtualProtect
GetVersionExA
GetWindowsDirectoryW
FileTimeToLocalFileTime
lstrcpyA
CloseHandle
CreateFileA
GetModuleHandleA
WriteConsoleW
GetConsoleOutputCP
SetLastError
CreateMutexW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
GetStartupInfoW
HeapFree
RtlUnwind
RaiseException
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
WideCharToMultiByte
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
user32
CharUpperBuffW
GetMenuBarInfo
CharLowerBuffW
DdeQueryStringA
GetClipboardOwner
CharToOemBuffA
advapi32
LogonUserW
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ