Static task
static1
Behavioral task
behavioral1
Sample
1e4a1051b50250a96b6bdce5921d2cd44d13fd2b28a502d7948570c49a82867e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1e4a1051b50250a96b6bdce5921d2cd44d13fd2b28a502d7948570c49a82867e.exe
Resource
win10v2004-20230703-en
General
-
Target
1e4a1051b50250a96b6bdce5921d2cd44d13fd2b28a502d7948570c49a82867e
-
Size
719KB
-
MD5
6e3145e464f2edb9d30e44dfb8cd9272
-
SHA1
b9d9384ff51e5de8fdf3f8af9925d4657cfa1a8a
-
SHA256
1e4a1051b50250a96b6bdce5921d2cd44d13fd2b28a502d7948570c49a82867e
-
SHA512
3356b7471259b48cc60ca88a5b34074e7b1e3f847eb2476ffec4aa7098a536f081418085cb5c963b85b7029186630fc98507a790f8dfaa7a03dff505eb74f82f
-
SSDEEP
6144:C6o4imGQe7H3BDdjIY9JEGqFsk4ohyS222XPR:nidHXB1IYLq6LoUL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e4a1051b50250a96b6bdce5921d2cd44d13fd2b28a502d7948570c49a82867e
Files
-
1e4a1051b50250a96b6bdce5921d2cd44d13fd2b28a502d7948570c49a82867e.exe windows x64
7aacf2ea7a33e8c02c5635ea378171de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
VirtualAlloc
VirtualProtect
GetProcAddress
LoadLibraryA
LocalAlloc
GetProcessAffinityMask
MultiByteToWideChar
CreateProcessA
VirtualQuery
IsBadReadPtr
CreateToolhelp32Snapshot
Module32First
Module32Next
WriteConsoleW
CreateFileW
HeapSize
GetCurrentThread
GetCurrentProcess
GetVersionExA
GetLastError
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlPcToFileHeader
RaiseException
RtlUnwindEx
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
CloseHandle
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
RtlUnwind
user32
MessageBoxA
advapi32
EnumServicesStatusA
CloseServiceHandle
OpenSCManagerA
dbghelp
SymInitializeW
ws2_32
gethostname
WSAStartup
WSACleanup
Sections
.text Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 417KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ