Static task
static1
Behavioral task
behavioral1
Sample
d3159aa1c490cd85fbfba864845f391555dda073d29a4909ee9162097955ee96.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d3159aa1c490cd85fbfba864845f391555dda073d29a4909ee9162097955ee96.exe
Resource
win10v2004-20230703-en
General
-
Target
d3159aa1c490cd85fbfba864845f391555dda073d29a4909ee9162097955ee96
-
Size
57KB
-
MD5
f9afeeff4be868a340680ddb021a115c
-
SHA1
58c106a6a91e90bd178c08df7e650ced0a527ce7
-
SHA256
d3159aa1c490cd85fbfba864845f391555dda073d29a4909ee9162097955ee96
-
SHA512
631f8f06c5fd80d388a44d79ed0721117db098a67319d52f03720460e9333b12b5c31ac7a5d7a97599aec459072c90bf5c967d91315260d2a2a35b0f98c98d09
-
SSDEEP
1536:zTZxQszrKVZeiwpEvD8AlYoKuCgYMjUA:BxzbikYgAlkv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3159aa1c490cd85fbfba864845f391555dda073d29a4909ee9162097955ee96
Files
-
d3159aa1c490cd85fbfba864845f391555dda073d29a4909ee9162097955ee96.exe windows x86
16726ce3249b7e56bb6faa787f588724
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
FillConsoleOutputCharacterW
FindResourceExW
FlushFileBuffers
FormatMessageW
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileType
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LoadResource
LocalFree
LockResource
QueryPerformanceCounter
RtlUnwind
SetConsoleCursorPosition
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteConsoleW
WriteFile
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnwprintf
_wcmdln
abort
calloc
exit
fprintf
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcslen
user32
ExitWindowsEx
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 892B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 27KB - Virtual size: 27KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ