Static task
static1
Behavioral task
behavioral1
Sample
a1cead87d30666b3fea208a8bcc95233906f1a338139bbab30a671a833da52d8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a1cead87d30666b3fea208a8bcc95233906f1a338139bbab30a671a833da52d8.exe
Resource
win10v2004-20230703-en
General
-
Target
a1cead87d30666b3fea208a8bcc95233906f1a338139bbab30a671a833da52d8
-
Size
863KB
-
MD5
d823cc7fbb53b46a5400509bc5122b3d
-
SHA1
5b3a939efb7bd35dc91a46dcb66bc4cf59e61cd4
-
SHA256
a1cead87d30666b3fea208a8bcc95233906f1a338139bbab30a671a833da52d8
-
SHA512
fa39175e6c26b08a106de146133cd3f965d69871de3da3b33dae468e42fff64b57d7a1e2a84c1cd65a8e09c95f62337a4e4cb881c49d637a8457b03618db705f
-
SSDEEP
12288:WqzHj5pAyZy46W3yRd6QrEt66zuzBR0pMgZ7z1I7rNYN5sfYjNmmadpRBcDsZXbB:W6juBm7lYYN5sf0NmmCRBDZhytHY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1cead87d30666b3fea208a8bcc95233906f1a338139bbab30a671a833da52d8
Files
-
a1cead87d30666b3fea208a8bcc95233906f1a338139bbab30a671a833da52d8.exe windows x86
0a81bccaca3d9fdc8f0d1cdbb3be7b8a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateFileW
GetCurrentThreadId
SuspendThread
ResumeThread
SetFileAttributesW
Sleep
GetFileInformationByHandle
FormatMessageW
LocalFileTimeToFileTime
GetLastError
FileTimeToSystemTime
GetCurrentThread
TerminateThread
TlsAlloc
CloseHandle
GetLocalTime
GetOverlappedResult
DeleteCriticalSection
SystemTimeToFileTime
TlsGetValue
SystemTimeToTzSpecificLocalTime
TlsFree
CreateEventA
GetTickCount
GetDriveTypeW
SetFilePointer
SetEndOfFile
FlushFileBuffers
GetFileSize
BackupRead
BackupSeek
GetFileTime
BackupWrite
GetFileSizeEx
CreateHardLinkW
SetConsoleCtrlHandler
SetPriorityClass
GetCommandLineW
SetSystemPowerState
GetCurrentProcess
GetThreadLocale
CreatePipe
CreateMutexA
DuplicateHandle
OpenProcess
ProcessIdToSessionId
TzSpecificLocalTimeToSystemTime
GetCurrentProcessId
SetThreadExecutionState
GetSystemTime
GetLongPathNameW
GetFileAttributesExW
GetStdHandle
SetConsoleMode
ReleaseMutex
GetConsoleMode
WriteConsoleW
GetTempPathW
CreateProcessW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetSystemDefaultLCID
GetProcAddress
FreeLibrary
UnmapViewOfFile
OpenMutexA
CreateFileMappingA
MapViewOfFile
DeviceIoControl
RemoveDirectoryW
FindFirstChangeNotificationW
GetVolumeNameForVolumeMountPointW
FindCloseChangeNotification
FindNextChangeNotification
GetModuleHandleW
InitializeCriticalSection
LeaveCriticalSection
SetThreadPriority
SetFileTime
GetDiskFreeSpaceW
WriteFile
FindNextFileW
EnterCriticalSection
SetLastError
TlsSetValue
CancelIo
GetVolumeInformationW
ReadFile
MoveFileW
CopyFileW
MoveFileExW
DeleteFileW
CreateDirectoryW
GetUserDefaultLCID
GetFileAttributesW
SetThreadLocale
FindFirstFileW
FindFirstFileExW
GetModuleFileNameW
GetSystemDirectoryW
GlobalAlloc
GlobalFree
LoadLibraryW
GlobalLock
MultiByteToWideChar
WideCharToMultiByte
CreateMutexW
InterlockedExchange
VirtualProtect
VirtualFree
InterlockedCompareExchange
VirtualAlloc
SetEvent
GetVersionExA
GetEnvironmentStringsW
WriteConsoleA
OutputDebugStringA
AttachConsole
GetConsoleProcessList
OutputDebugStringW
GetFileType
AllocConsole
RtlCaptureStackBackTrace
GetExitCodeThread
RaiseException
CreateThread
IsBadReadPtr
SetUnhandledExceptionFilter
ExitProcess
SizeofResource
FindResourceA
LockResource
LoadResource
GetSystemInfo
VirtualQuery
LoadLibraryExA
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
CreateEventW
GetSystemTimeAsFileTime
GetStringTypeW
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
LoadLibraryExW
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ReadConsoleInputA
GetModuleFileNameA
GetCommandLineA
GetACP
HeapAlloc
HeapReAlloc
HeapFree
IsValidLocale
EnumSystemLocalesW
SetStdHandle
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
GetConsoleCP
HeapSize
SetFilePointerEx
GetEnvironmentVariableW
GetFullPathNameW
FindClose
gdi32
GetObjectType
GetClipRgn
CreateRectRgn
GetObjectA
SetBkColor
CreateSolidBrush
SelectObject
GetDeviceCaps
DeleteDC
SetTextColor
SetBkMode
SelectClipRgn
LPtoDP
DeleteObject
CreateFontIndirectW
DPtoLP
wintrust
WinVerifyTrust
Sections
.text Size: 586KB - Virtual size: 585KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ