Static task
static1
Behavioral task
behavioral1
Sample
384cebe360112fa54eec24e645c63ae6771918945a638055ec9ad94b759b7d5f.exe
Resource
win10-20230703-en
General
-
Target
384cebe360112fa54eec24e645c63ae6771918945a638055ec9ad94b759b7d5f
-
Size
376KB
-
MD5
7c12f10dfda4a9a860afe5b260fd678c
-
SHA1
7b04051053b18ea4d252429d83b8ce6d53e8a62d
-
SHA256
384cebe360112fa54eec24e645c63ae6771918945a638055ec9ad94b759b7d5f
-
SHA512
934fac6d634d813c0baa3b4a91186c7993d5d8b53ac63901e9fc3d99b001cdb9ce9fb05f4c347bb286f84c6bcfa288eeb7291dc8c9f8de21f12a8dca600462d4
-
SSDEEP
6144:Hev7hVZs/mLt3q9KNgofGo2wmhRpTnN1mXzYqf:HeVZs+x3IigofGoHmrpTN1E9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 384cebe360112fa54eec24e645c63ae6771918945a638055ec9ad94b759b7d5f
Files
-
384cebe360112fa54eec24e645c63ae6771918945a638055ec9ad94b759b7d5f.exe windows x86
b960f8af34a227089edf1078d597a8fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
FindResourceA
lstrlenA
WritePrivateProfileStructA
GetConsoleAliasesLengthW
PeekNamedPipe
TlsGetValue
AllocConsole
FindResourceW
HeapAlloc
_lwrite
InterlockedDecrement
InterlockedCompareExchange
FindCloseChangeNotification
OpenSemaphoreA
GetTickCount
GetConsoleAliasesA
FormatMessageA
GetCompressedFileSizeW
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
WriteConsoleOutputA
TransactNamedPipe
CreateActCtxA
DisconnectNamedPipe
GetDateFormatW
GetLastError
lstrcmpiA
GetProcAddress
AttachConsole
VirtualAlloc
CreateMemoryResourceNotification
SearchPathA
SetFileApisToOEM
LoadLibraryA
OpenMutexA
DeleteTimerQueue
EnumResourceTypesW
GetThreadPriority
GetCommTimeouts
HeapSetInformation
UpdateResourceW
GetStringTypeW
Module32NextW
ReadConsoleInputW
GetWindowsDirectoryW
GetCurrentProcessId
AddConsoleAliasA
ResetWriteWatch
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProfileIntA
GetComputerNameA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
SetEndOfFile
GetProcessHeap
ReadFile
user32
CharUpperBuffA
LoadMenuW
CharLowerBuffA
CharToOemBuffA
advapi32
InitiateSystemShutdownA
Sections
.text Size: 262KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ