Static task
static1
Behavioral task
behavioral1
Sample
d3467a7863ee4b6c1ee8fee15e4e89b505c925a9a874586bba96469d99915948.exe
Resource
win10v2004-20230703-en
General
-
Target
d3467a7863ee4b6c1ee8fee15e4e89b505c925a9a874586bba96469d99915948
-
Size
787KB
-
MD5
cefcf7d9059f69909568209b1a4c2be4
-
SHA1
4e9552daf38409254e397f143cb88b908fc34e2d
-
SHA256
d3467a7863ee4b6c1ee8fee15e4e89b505c925a9a874586bba96469d99915948
-
SHA512
de693e27a3bb05cc3972b2b09be0e6caf0d2ab01ba2dedec8e6a1c790c98c3ec0b2b0eea1bf1c424979e01748fa8d9242fe5440178e63e914cc4d1b4cfd43221
-
SSDEEP
24576:pPyMvHqOI6k3WBikU0ZsO2MjXiUO+fxBhz:xyMNsGBiU35OUdz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3467a7863ee4b6c1ee8fee15e4e89b505c925a9a874586bba96469d99915948
Files
-
d3467a7863ee4b6c1ee8fee15e4e89b505c925a9a874586bba96469d99915948.exe windows x86
4c42d56db8a71f86f9ab1a7084ee75c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
SearchPathW
FindResourceA
lstrlenA
WritePrivateProfileStructA
GetConsoleAliasesLengthW
PeekNamedPipe
TlsGetValue
AllocConsole
HeapAlloc
_lwrite
InterlockedDecrement
InterlockedCompareExchange
GetTickCount
FormatMessageA
GlobalAlloc
GetLocaleInfoW
WriteConsoleOutputA
TransactNamedPipe
GetCompressedFileSizeA
CreateActCtxA
SetThreadPriority
DisconnectNamedPipe
GetConsoleAliasesW
GetDateFormatW
OpenMutexW
GetLastError
lstrcmpiA
GetProcAddress
AttachConsole
VirtualAlloc
CreateMemoryResourceNotification
SetFileApisToOEM
LoadLibraryA
InterlockedExchangeAdd
DeleteTimerQueue
FindNextChangeNotification
Module32FirstW
EnumResourceTypesW
GetCommTimeouts
UpdateResourceW
GetStringTypeW
OpenSemaphoreW
ReadConsoleInputW
GetWindowsDirectoryW
GetCurrentProcessId
AddConsoleAliasA
ResetWriteWatch
CreateFileA
SetStdHandle
WriteConsoleW
GetProfileIntA
GetComputerNameA
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
user32
CharToOemBuffA
CharUpperBuffA
LoadMenuW
CharLowerBuffA
advapi32
InitiateSystemShutdownA
ole32
ReadClassStg
Sections
.text Size: 674KB - Virtual size: 674KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ