Static task
static1
Behavioral task
behavioral1
Sample
4ad7e274bb4d3d256b4d3a547396fc98f5b69bea7c53178b3cfb2875eb8684b5.exe
Resource
win10-20230703-en
General
-
Target
4ad7e274bb4d3d256b4d3a547396fc98f5b69bea7c53178b3cfb2875eb8684b5
-
Size
341KB
-
MD5
3beacfd9e60a36419b76badb0cff598a
-
SHA1
a8779a1735d6c646175584c03aefced37ec447e4
-
SHA256
4ad7e274bb4d3d256b4d3a547396fc98f5b69bea7c53178b3cfb2875eb8684b5
-
SHA512
c75df21823bdbc6c478f866be0614ee51b7b369dd2a10e1f1d240365e601949b6021864f1224fb4925e448966c0d14733158c4085f625a731196751d91d62e21
-
SSDEEP
6144:sz7LnLdy6rrUcUlacR+owohQe3DBwQ6muFs:sznxy6rg4c0oemw2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ad7e274bb4d3d256b4d3a547396fc98f5b69bea7c53178b3cfb2875eb8684b5
Files
-
4ad7e274bb4d3d256b4d3a547396fc98f5b69bea7c53178b3cfb2875eb8684b5.exe windows x86
368902b81c288b3fc8f589128cdc5e4b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBAndTimeoutsA
DeleteVolumeMountPointA
EndUpdateResourceW
SetConsoleTextAttribute
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
QueryPerformanceCounter
SetHandleInformation
GetProfileStringW
OpenSemaphoreA
GetSystemDefaultLCID
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetWindowsDirectoryA
WaitNamedPipeW
EnumTimeFormatsW
GetUserDefaultLangID
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
_hread
GetSystemWindowsDirectoryA
SetConsoleCP
GetExitCodeProcess
GetTimeFormatW
GetConsoleAliasW
SetConsoleCursorPosition
GetFileAttributesW
lstrcatA
QueryInformationJobObject
GetStartupInfoW
CreateJobObjectA
GetConsoleAliasExesLengthA
GetStartupInfoA
FindFirstFileA
OpenMutexW
GetCurrentDirectoryW
SetLastError
GetProcAddress
MoveFileW
GlobalGetAtomNameA
GetPrivateProfileStringA
OpenWaitableTimerA
LoadLibraryA
InterlockedExchangeAdd
GetFileType
MoveFileA
GetNumberFormatW
AddAtomW
GetPrivateProfileSectionNamesA
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
FreeEnvironmentStringsW
CreateMailslotA
EnumDateFormatsW
PeekConsoleInputA
SetCalendarInfoA
SetThreadAffinityMask
OpenSemaphoreW
SetFileShortNameA
ReadConsoleInputW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DebugBreak
ResetWriteWatch
ReadConsoleOutputCharacterW
EnumSystemLocalesW
DeleteFileA
MoveFileExA
GetConsoleAliasExesA
SetFilePointer
InterlockedExchange
GetDateFormatW
GetLastError
HeapFree
WideCharToMultiByte
HeapAlloc
GetCommandLineW
HeapSetInformation
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
HeapCreate
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcessId
GetSystemTimeAsFileTime
GetConsoleCP
Sleep
LCMapStringW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
RtlUnwind
SetStdHandle
WriteConsoleW
HeapReAlloc
HeapSize
FlushFileBuffers
ReadFile
CreateFileW
CloseHandle
RaiseException
gdi32
GetTextFaceA
GetCharABCWidthsA
SelectPalette
GetCharWidthW
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 166KB - Virtual size: 30.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tudo Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ