Static task
static1
Behavioral task
behavioral1
Sample
14120fec8ffc800a32dd810186dd747d28fb712c3f610c8a2675d9c47fa5eae0.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
14120fec8ffc800a32dd810186dd747d28fb712c3f610c8a2675d9c47fa5eae0.exe
Resource
win10v2004-20230703-en
General
-
Target
14120fec8ffc800a32dd810186dd747d28fb712c3f610c8a2675d9c47fa5eae0
-
Size
553KB
-
MD5
9eee602ee4d0cff3f45ab94cf257d0ec
-
SHA1
d9b89f63ff72223e05a4c5f23938d0251eb59aee
-
SHA256
14120fec8ffc800a32dd810186dd747d28fb712c3f610c8a2675d9c47fa5eae0
-
SHA512
c1fea3bad89868ac952b643167bd7fa6ca6fac7a76c1b6102fe296aa0d0061f5a23ba2b88e55a840ee3b45c47fb164a4f11d705b9560a1c2983ce5574bf6f7d1
-
SSDEEP
12288:oeHmo1qD5p0FszLhskUNbERKCGxeCdRC5Mx88CcwCEfgo16SXKPJsw+:dmkqb0IFskUqSeCbCYLEfgo1d6xsw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14120fec8ffc800a32dd810186dd747d28fb712c3f610c8a2675d9c47fa5eae0
Files
-
14120fec8ffc800a32dd810186dd747d28fb712c3f610c8a2675d9c47fa5eae0.exe windows x64
0704481e6f7dc1c31dfd6c894c02c456
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GlobalFree
Process32FirstW
GetLastError
CreateToolhelp32Snapshot
CloseHandle
MultiByteToWideChar
GlobalAlloc
OpenProcess
Wow64DisableWow64FsRedirection
GetCurrentProcess
Process32NextW
lstrlenA
LocalFree
SetEnvironmentVariableA
CompareStringW
CreateFileW
ReadFile
GetProcessHeap
SetEndOfFile
HeapReAlloc
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
GetCommandLineA
GetStartupInfoW
RaiseException
RtlPcToFileHeader
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
HeapSetInformation
GetVersion
HeapCreate
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
Sleep
HeapSize
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LoadLibraryW
CreateFileA
SetFilePointer
WriteConsoleW
SetStdHandle
FlushFileBuffers
LCMapStringW
GetStringTypeW
CreateDirectoryA
advapi32
DuplicateTokenEx
LookupAccountSidW
GetTokenInformation
OpenProcessToken
RevertToSelf
ImpersonateLoggedOnUser
shell32
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoInitializeEx
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 450KB - Virtual size: 449KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ