Static task
static1
Behavioral task
behavioral1
Sample
01eda66b9819577dcda75420a5aee8cb23003715d9d4236ccff41e8d2b438107.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
01eda66b9819577dcda75420a5aee8cb23003715d9d4236ccff41e8d2b438107.exe
Resource
win10v2004-20230703-en
General
-
Target
01eda66b9819577dcda75420a5aee8cb23003715d9d4236ccff41e8d2b438107
-
Size
2.4MB
-
MD5
063694b7d298c2b5bfc89cef8dda16bf
-
SHA1
13030939052bbb7d06ed53cec0f13057c3a23a6d
-
SHA256
01eda66b9819577dcda75420a5aee8cb23003715d9d4236ccff41e8d2b438107
-
SHA512
c76adf22d2aeb2b56e8e179d82e4ef9053b6763aa714189e5f155bb44993d140522a887be3640be0cf4db2fa57f57907df234550af069664f136d32988f4e7ff
-
SSDEEP
24576:OLXTqqFLAnXGP4WCUdztT9rWwWRJq/bj9RFI1sZSfaLoX6OOyk53lqbZF2oyPcyo:OLGqhAnXS4/U959vT21sZS8OOyk58
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01eda66b9819577dcda75420a5aee8cb23003715d9d4236ccff41e8d2b438107
Files
-
01eda66b9819577dcda75420a5aee8cb23003715d9d4236ccff41e8d2b438107.exe windows x64
4b6ef57c003932daf2fea1f55c6eac73
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
Beep
DeleteCriticalSection
EnterCriticalSection
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleCP
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLargestConsoleWindowSize
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
LockFile
MultiByteToWideChar
QueryPerformanceCounter
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
ScrollConsoleScreenBufferA
SetConsoleCursorPosition
SetConsoleMode
SetConsoleWindowInfo
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
UnlockFile
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteConsoleOutputA
WriteFile
msvcrt
__C_specific_handler
__doserrno
__getmainargs
__initenv
__iob_func
__lconv_init
__pioinfo
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_controlfp
_errno
_execl
_filelengthi64
_fileno
_fmode
_fpreset
_get_osfhandle
_i64toa
_i64tow
_initterm
_itoa
_localtime64
_lseeki64
_onexit
_pclose
_popen
_putenv
_snprintf
_snwprintf
_spawnl
_strdup
_stricmp
_strnicmp
_time64
_ui64toa
_ui64tow
_ultoa
_write
abort
acos
asin
atan
atan2
atoi
calloc
cos
exit
exp
fclose
feof
fflush
fgetpos
fgets
fopen
fprintf
fputs
fread
free
freopen
fsetpos
fwrite
getc
getenv
islower
isspace
isupper
localeconv
log
log10
malloc
mbstowcs
memchr
memcmp
memcpy
memmove
memset
modf
pow
raise
realloc
remove
rename
setlocale
setvbuf
signal
sin
sprintf
strchr
strcpy
strlen
strncmp
strncpy
strrchr
strtoul
system
tan
tolower
toupper
ungetc
vfprintf
wcslen
wcsncmp
wcsstr
wcstombs
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 457KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 904KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE