Static task
static1
Behavioral task
behavioral1
Sample
3669405f788b0af662786cbeed1057db8910bf2260c0a41992f0f5e4749f4364.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3669405f788b0af662786cbeed1057db8910bf2260c0a41992f0f5e4749f4364.exe
Resource
win10v2004-20230703-en
General
-
Target
3669405f788b0af662786cbeed1057db8910bf2260c0a41992f0f5e4749f4364
-
Size
4.1MB
-
MD5
ea223f121ca36059d6f27cac18733ed8
-
SHA1
a0d6d99edc4450b59412fe333a904a7849cf4b9c
-
SHA256
3669405f788b0af662786cbeed1057db8910bf2260c0a41992f0f5e4749f4364
-
SHA512
f6ff768cd807616be11f4e453d55bcfb0638755532dd4dedc35063378a4b4aee132171a66bf4cb8284cf1810497e41902dbff9065768c2f4a46235826f1825ac
-
SSDEEP
49152:FzGjLDqPmX6aAV4gMfL6zbI4Nj38o97KUsy4PcsV4dKMmCNFMGk:BW6VQ2w4JXX4E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3669405f788b0af662786cbeed1057db8910bf2260c0a41992f0f5e4749f4364
Files
-
3669405f788b0af662786cbeed1057db8910bf2260c0a41992f0f5e4749f4364.exe windows x64
c36870f13fe7db69abf4911510bc080d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
Process32First
VirtualQueryEx
GetCommandLineA
OpenProcess
Sleep
ReadProcessMemory
CreateProcessA
GetStartupInfoA
lstrcmpiA
GetProcAddress
LoadLibraryA
Process32Next
GetModuleFileNameA
CreateToolhelp32Snapshot
CloseHandle
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
SetStdHandle
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
LoadLibraryW
HeapSize
GetModuleFileNameW
FlsAlloc
GetCurrentThreadId
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
GetModuleHandleW
ExitProcess
GetCommandLineW
GetStartupInfoW
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
HeapSetInformation
GetVersion
HeapCreate
ReadFile
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetProcessHeap
user32
DialogBoxParamA
LoadCursorA
UpdateWindow
DispatchMessageA
CreateWindowExW
ShowWindow
LoadAcceleratorsA
EndPaint
DestroyWindow
GetMessageA
PostQuitMessage
LoadIconA
BeginPaint
TranslateMessage
RegisterClassExW
TranslateAcceleratorA
EndDialog
DefWindowProcA
LoadStringW
ws2_32
inet_pton
closesocket
socket
htons
WSAStartup
connect
send
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ