Static task
static1
Behavioral task
behavioral1
Sample
c17336d7c543eef6427833e8a3f419dd02c7cd2fd7665725732c35e61a354f2c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c17336d7c543eef6427833e8a3f419dd02c7cd2fd7665725732c35e61a354f2c.exe
Resource
win10v2004-20230703-en
General
-
Target
c17336d7c543eef6427833e8a3f419dd02c7cd2fd7665725732c35e61a354f2c
-
Size
355KB
-
MD5
c8133efa393bd6bd0996529f980b50e2
-
SHA1
da91afcff5c44bc3b8e23bb2028d1197f24e9a32
-
SHA256
c17336d7c543eef6427833e8a3f419dd02c7cd2fd7665725732c35e61a354f2c
-
SHA512
c9d4db0981650d25bfcfc9ba284b9859cebe3b04605af974e09fbb63406505fedee22fcba5590fef0e374e9bc86d35dc2c8bdf5da52005e0d93d9a46d08afb8d
-
SSDEEP
3072:9VKHrjUKLo8E2thrmrGWmSwwU09SrsM5ECw3P5kspmmlwlGvPGT1lTUM:3KXUKLo8ljimuSr5TImspmmljv+HT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c17336d7c543eef6427833e8a3f419dd02c7cd2fd7665725732c35e61a354f2c
Files
-
c17336d7c543eef6427833e8a3f419dd02c7cd2fd7665725732c35e61a354f2c.exe windows x86
90bb6a3da0583450c6f11becc85dcf42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthW
AllocConsole
GetProfileIntW
GlobalAddAtomA
CompareFileTime
AddConsoleAliasW
GetComputerNameW
GetTickCount
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetWindowsDirectoryA
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
CreateEventA
TransactNamedPipe
FindNextVolumeW
FindResourceA
GetGeoInfoA
ReadFile
DisconnectNamedPipe
GetLastError
SetLastError
lstrcmpiA
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
LoadLibraryA
CreateMutexA
FatalAppExitA
_lopen
SetFileShortNameA
ReadConsoleInputW
CreateFileA
SetStdHandle
SetConsoleCursorPosition
CreateMutexW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
GetStartupInfoW
RaiseException
RtlUnwind
HeapFree
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapAlloc
HeapSize
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
LoadMenuW
CharLowerBuffA
CharUpperBuffA
advapi32
InitializeAcl
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 31.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ