Static task
static1
Behavioral task
behavioral1
Sample
4f52e493e62354654b3921bfb7ae40e77dc78765ad3976c3989047954a7210a1.exe
Resource
win10-20230703-en
General
-
Target
4f52e493e62354654b3921bfb7ae40e77dc78765ad3976c3989047954a7210a1
-
Size
817KB
-
MD5
72757a0b584991d19448b3ef3a4c0e46
-
SHA1
363c990ada80bbca2e2ff843606da84e5d6effa5
-
SHA256
4f52e493e62354654b3921bfb7ae40e77dc78765ad3976c3989047954a7210a1
-
SHA512
025daafc448ea7867b3cf315f7b29375c338607c150552886e5b0b30664a1f3e4f5ea816cad1799aaf9244db2785a62ab119a390e3e5ffb4ac75b134fadb8f04
-
SSDEEP
24576:B1ekfFHxQ1+TkCgNe7VIpYndNHhhKaRR:B1ekf01uGempYrhhKo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f52e493e62354654b3921bfb7ae40e77dc78765ad3976c3989047954a7210a1
Files
-
4f52e493e62354654b3921bfb7ae40e77dc78765ad3976c3989047954a7210a1.exe windows x86
04e6f3b72e548c719c7cd8b3a1be4f09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBAndTimeoutsA
EndUpdateResourceW
OpenJobObjectA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetHandleInformation
GetProfileStringW
GetTimeFormatA
OpenSemaphoreA
GetSystemDefaultLCID
FreeEnvironmentStringsA
GetTickCount
GenerateConsoleCtrlEvent
GetWindowsDirectoryA
WaitNamedPipeW
EnumTimeFormatsA
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
DeleteVolumeMountPointW
GetExitCodeProcess
GetConsoleAliasW
SetConsoleCursorPosition
GetFileAttributesW
lstrcatA
GetStartupInfoW
CreateJobObjectA
EnumSystemLocalesA
GetConsoleAliasExesLengthA
FindFirstFileA
OpenMutexW
GetCurrentDirectoryW
SetLastError
GetProcAddress
MoveFileW
OpenWaitableTimerA
LoadLibraryA
InterlockedExchangeAdd
GetFileType
MoveFileA
GetNumberFormatW
GlobalGetAtomNameW
GetPrivateProfileSectionNamesA
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
CreateMailslotA
EnumDateFormatsW
PeekConsoleInputA
SetCalendarInfoA
OpenSemaphoreW
SetFileShortNameA
ReadConsoleInputW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DebugBreak
ResetWriteWatch
ReadConsoleOutputCharacterW
DeleteFileA
GetSystemDefaultLangID
MoveFileExA
GetConsoleAliasExesA
SetFilePointer
GetStartupInfoA
WideCharToMultiByte
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
GetCommandLineW
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
IsProcessorFeaturePresent
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
HeapReAlloc
GetConsoleCP
SetStdHandle
WriteConsoleW
FlushFileBuffers
ReadFile
CreateFileW
CloseHandle
gdi32
GetCharABCWidthsW
GetCharWidthW
GetTextFaceA
SelectPalette
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 598KB - Virtual size: 31.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jeyor Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ