Static task
static1
Behavioral task
behavioral1
Sample
72b0d72efd7304d1376ab921ed7958521802ab16751ce11632eb5df7945976f2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
72b0d72efd7304d1376ab921ed7958521802ab16751ce11632eb5df7945976f2.exe
Resource
win10v2004-20230824-en
General
-
Target
72b0d72efd7304d1376ab921ed7958521802ab16751ce11632eb5df7945976f2
-
Size
444KB
-
MD5
79679a9d43ccefe06e3789cb6beac8f3
-
SHA1
1b1c744d51ee457ba09dbab1845e4421e621cf8e
-
SHA256
72b0d72efd7304d1376ab921ed7958521802ab16751ce11632eb5df7945976f2
-
SHA512
9dba7a448f80b7e3c8aea41d552b3a420090dc6345e23d967f985e9ca09c891ae8db96d58159ea4fd1159cbfbf3a1d6b9e26ccc18fc584a4ac54a19037fd1631
-
SSDEEP
12288:0u8UeCjT9iRBz7GZZenX59C8p5EtieFu:0/CjTMRUZAOieFu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72b0d72efd7304d1376ab921ed7958521802ab16751ce11632eb5df7945976f2
Files
-
72b0d72efd7304d1376ab921ed7958521802ab16751ce11632eb5df7945976f2.exe windows x86
e8cc390b6b9dbed05da338aa3ae0c2d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableA
GetFileAttributesA
GetSystemTimeAsFileTime
CreateDirectoryW
MoveFileA
GetModuleHandleA
Sleep
GetLastError
DeleteFileA
GetProcAddress
SizeofResource
WriteFile
CreateFileW
LockResource
CloseHandle
LoadResource
FindResourceW
GetModuleHandleW
WriteConsoleW
HeapSize
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwind
RaiseException
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetDriveTypeW
GetFullPathNameW
GetModuleFileNameW
GetStdHandle
GetCommandLineA
GetCommandLineW
GetFileSizeEx
SetFilePointerEx
GetFileType
HeapAlloc
GetTimeZoneInformation
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapFree
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadFile
ReadConsoleW
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
GetCurrentDirectoryW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
SetEndOfFile
user32
wsprintfW
shell32
ShellExecuteA
shlwapi
PathFileExistsA
Sections
.text Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ