Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230703-en
General
-
Target
9424738ef06a5a20218a31d750b432a302483e2503490affd5339840ac44f8ad.bin.sample.gz
-
Size
635KB
-
MD5
09ada55f2410a669d4ac891d36724323
-
SHA1
f1c0f659a06ebf21d8f470811690a13cb8efb069
-
SHA256
76519fe50878e3a703b5736d9368958bd1305d46d08f60e2eb5380850845c636
-
SHA512
74dcc6bad8d7d3309edc7c8a7933f6dc23411af50a5e01d1ecac1ecca0d04299c6d14e76388ddb73380047cb40343ba889ee87c45fa5595846a09536e5613c7f
-
SSDEEP
12288:sFe49ditc5i84YAy7dcfD4yS5E7odwQ/dnW/aEaJp25Bpqa4MxukT8+gsIw:sFe49ditc5i84/y7wRSKdQ/dWSEopvO5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/sample
Files
-
9424738ef06a5a20218a31d750b432a302483e2503490affd5339840ac44f8ad.bin.sample.gz.gz
-
sample.exe windows x86
79e975a9410c93189a76e54d98ddfc3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeNameForVolumeMountPointA
GetCommandLineW
GetComputerNameA
GetFileSize
SetDefaultCommConfigA
GetDriveTypeW
GetConsoleAliasExesLengthA
UpdateResourceA
InterlockedIncrement
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
WaitNamedPipeA
GetCurrentProcess
SetConsoleActiveScreenBuffer
GetProfileStringW
GetUserDefaultLCID
SetComputerNameW
GetTimeFormatA
FreeEnvironmentStringsA
_lclose
_lcreat
GetModuleHandleW
CreateNamedPipeW
GetConsoleAliasesLengthA
GetWindowsDirectoryA
GetConsoleAliasExesW
EnumTimeFormatsA
GlobalAlloc
GetPrivateProfileIntA
SetFileShortNameW
LoadLibraryW
TerminateThread
ReadConsoleInputA
_hread
GetPrivateProfileStructW
GetCalendarInfoW
SetConsoleCP
DeleteVolumeMountPointW
GetFileAttributesA
TransactNamedPipe
GetCompressedFileSizeA
GetStartupInfoW
CreateMailslotW
VirtualUnlock
GetNamedPipeHandleStateW
SetCurrentDirectoryA
GetLastError
IsDBCSLeadByteEx
SetLastError
GetProcAddress
VirtualAlloc
BackupWrite
MoveFileW
GlobalGetAtomNameA
GlobalFree
LoadLibraryA
OpenWaitableTimerW
LocalAlloc
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
GetNumberFormatW
GetCurrentConsoleFont
EnumDateFormatsA
CreateIoCompletionPort
_lread
OpenFileMappingW
FreeEnvironmentStringsW
FindNextFileW
GetCurrentDirectoryA
FatalAppExitA
OpenSemaphoreW
FindFirstVolumeA
TerminateJobObject
LocalSize
DeleteFileW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
DeleteFileA
CloseHandle
ReadFile
WriteConsoleW
LCMapStringW
HeapReAlloc
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
MoveFileA
HeapFree
HeapAlloc
ExitProcess
GetCommandLineA
HeapSetInformation
RtlUnwind
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
WriteFile
GetModuleFileNameW
SetFilePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
RaiseException
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
CreateFileW
user32
CharUpperA
CharUpperBuffA
winhttp
WinHttpGetProxyForUrl
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 585KB - Virtual size: 31.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ