Static task
static1
Behavioral task
behavioral1
Sample
7db4a17d481c2205c209742d495ae5752d770c4c9a06435d993b8c44fea7d337.exe
Resource
win10-20230703-en
General
-
Target
7db4a17d481c2205c209742d495ae5752d770c4c9a06435d993b8c44fea7d337
-
Size
339KB
-
MD5
554362f8a18333a0645fbb5f857ced29
-
SHA1
304d28994735fb95d13bced8dc0865f2ce67928d
-
SHA256
7db4a17d481c2205c209742d495ae5752d770c4c9a06435d993b8c44fea7d337
-
SHA512
458621a6f23b53e5d13292b5f1147adec0f62325a3e4f1fefeb4a478e4707809c6c4898d73246baf708b3365cc58e69471d76e27c87c7c3e9d063d4949081e3b
-
SSDEEP
6144:P5kvdQNtTHYKjUqq8opePLBiJLs8Q1BP+2hPgPHRfzj:hklQzT4IlqDpAL4Jw80Di/Rfz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7db4a17d481c2205c209742d495ae5752d770c4c9a06435d993b8c44fea7d337
Files
-
7db4a17d481c2205c209742d495ae5752d770c4c9a06435d993b8c44fea7d337.exe windows x86
7c940fbf921a895a6be12db5d2d5132b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesA
GetDriveTypeW
_llseek
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
EndUpdateResourceW
InterlockedIncrement
SetConsoleTextAttribute
GetConsoleAliasA
InterlockedDecrement
QueryPerformanceCounter
GetProfileStringW
GetTimeFormatA
OpenSemaphoreA
FreeEnvironmentStringsA
GetTickCount
GetNumberFormatA
WaitNamedPipeW
GetUserDefaultLangID
GetCommandLineA
GetConsoleCP
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
_hread
GetCalendarInfoW
GetSystemWindowsDirectoryA
GetExitCodeProcess
SetConsoleMode
SetConsoleCursorPosition
GetFileAttributesW
lstrcatA
CreateJobObjectA
GetPrivateProfileIntW
SetInformationJobObject
GetStartupInfoA
OpenMutexW
GetHandleInformation
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
PeekConsoleInputW
MoveFileW
OpenWaitableTimerA
LoadLibraryA
SetCalendarInfoW
GetFileType
MoveFileA
BuildCommDCBAndTimeoutsW
AddVectoredExceptionHandler
AddAtomW
GlobalGetAtomNameW
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
CreateMailslotA
GetCurrentDirectoryA
EnumDateFormatsW
GetUserDefaultUILanguage
SetThreadAffinityMask
SetFileShortNameA
GetWindowsDirectoryW
FindFirstVolumeW
GetCurrentProcessId
DebugBreak
ResetWriteWatch
EnumSystemLocalesW
DeleteFileA
SetProcessAffinityMask
GetDateFormatW
InterlockedExchange
GetVolumeNameForVolumeMountPointA
GetLastError
WideCharToMultiByte
HeapAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetModuleHandleW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sleep
IsProcessorFeaturePresent
RtlUnwind
HeapReAlloc
HeapSize
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
RaiseException
gdi32
GetBoundsRect
GetCharWidthA
GetTextFaceA
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 166KB - Virtual size: 30.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vajifij Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ