Static task
static1
Behavioral task
behavioral1
Sample
1b148c2051783abc2057e6c77ce6d0146b10e798a7203c96dab882e03def9580.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1b148c2051783abc2057e6c77ce6d0146b10e798a7203c96dab882e03def9580.exe
Resource
win10-20230703-en
General
-
Target
1b148c2051783abc2057e6c77ce6d0146b10e798a7203c96dab882e03def9580
-
Size
829KB
-
MD5
2fe257098023b4cd88814502bd1cf836
-
SHA1
e87036d9ff389d7725fb46005f6e5e2f1803c1d2
-
SHA256
1b148c2051783abc2057e6c77ce6d0146b10e798a7203c96dab882e03def9580
-
SHA512
85a51bc61d4ac06ecc395464133db943cca79869163b61d5f086edf607e85dfd085e606a2675d7e5bd211b7ab12d5947776f9f733811beff97bda8981d4641b5
-
SSDEEP
12288:4ubXKyUjZ6X30vYSxv5jLZHbJbCL337p0PBucyiQA2CdRmLr:BWRAn0XlLLbCz3McAD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b148c2051783abc2057e6c77ce6d0146b10e798a7203c96dab882e03def9580
Files
-
1b148c2051783abc2057e6c77ce6d0146b10e798a7203c96dab882e03def9580.exe windows x86
dedd1d0ad9fa52e6d98ddb7809d110ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
SetInformationJobObject
GetConsoleAliasesLengthW
GetConsoleAliasExesA
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
MoveFileExW
InterlockedDecrement
WaitNamedPipeA
GetCurrentProcess
GetNamedPipeHandleStateA
SetHandleInformation
GetProfileStringW
GetComputerNameW
GetTimeFormatA
FlushConsoleInputBuffer
GetSystemDefaultLCID
FreeEnvironmentStringsA
_lclose
_lcreat
GetModuleHandleW
GetNumberFormatA
EnumTimeFormatsW
GetUserDefaultLangID
GetCommandLineA
GetDriveTypeA
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
TerminateThread
ReadConsoleInputA
_hread
GetCalendarInfoW
SetConsoleCP
GetConsoleAliasW
IsDBCSLeadByte
GetStartupInfoW
CreateMailslotW
SetCurrentDirectoryA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
HeapSize
BackupWrite
MoveFileW
SetComputerNameA
OpenWaitableTimerW
GetFileType
MoveFileA
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
GlobalGetAtomNameW
GetPrivateProfileStructA
FindNextFileA
CreateIoCompletionPort
_lread
GetModuleHandleA
OpenFileMappingW
GetProcessAffinityMask
FindNextFileW
VirtualProtect
EnumDateFormatsW
GetConsoleCursorInfo
FatalAppExitA
PeekConsoleInputA
OpenSemaphoreW
FindFirstVolumeA
LocalSize
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
DeleteFileW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CloseHandle
ReadFile
WriteConsoleW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
DeleteFileA
ExitProcess
HeapSetInformation
RtlUnwind
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapReAlloc
LCMapStringW
CreateFileW
user32
CharUpperBuffA
CharUpperA
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 585KB - Virtual size: 31.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ