Static task
static1
Behavioral task
behavioral1
Sample
14d8bbfc257aad19d948a3923693b985.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
14d8bbfc257aad19d948a3923693b985.exe
Resource
win10v2004-20230703-en
General
-
Target
14d8bbfc257aad19d948a3923693b985
-
Size
193KB
-
MD5
14d8bbfc257aad19d948a3923693b985
-
SHA1
ce5b93a2f1ac176633b4683ffe2bdca2eed2b786
-
SHA256
3fd5dae3ac5a57027e9f206f533a548ddd2de9203a6940d213be78100ea89703
-
SHA512
a6e10d92e453e8e4246c42f460f0a165cffc563a4616817f78312d3bb7a6c239f184187d2d7282a9542d04922e52430b2a40a3c45b9e7f94ce886857ed1523c8
-
SSDEEP
3072:CZAWwgi7z2ApI68WzMOxoCfJuqDL/XB4xNvPg5FFLUxvugC0YOAg0Fuj0wSJ9u:7ggpIpEx7JuS/RcgNgACAOI8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14d8bbfc257aad19d948a3923693b985
Files
-
14d8bbfc257aad19d948a3923693b985.exe windows x86
e98b31313a6dbdb2f4925ff159a36009
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
Process32First
VirtualProtect
VirtualFree
VirtualAlloc
Thread32Next
Thread32First
CreateToolhelp32Snapshot
Process32Next
CloseHandle
GetConsoleWindow
OpenThread
SetEndOfFile
WriteConsoleW
HeapSize
CreateFileW
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LocalFree
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
GetLastError
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetFileSizeEx
SetFilePointerEx
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
ReadConsoleW
HeapReAlloc
user32
ShowWindow
PostThreadMessageA
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
oleaut32
VariantInit
SysFreeString
SysAllocString
VariantClear
urlmon
URLDownloadToFileA
Sections
.text Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ