Static task
static1
Behavioral task
behavioral1
Sample
b12328ae08738c6e4a5e73bb526aaf2f044dcf81ca459b6a8f62acbf1852528d.exe
Resource
win10v2004-20230831-en
General
-
Target
b12328ae08738c6e4a5e73bb526aaf2f044dcf81ca459b6a8f62acbf1852528d
-
Size
268KB
-
MD5
62f41f98196b94a15c453ad0bb71f150
-
SHA1
f8a3b5c0334582498324ac3f6ea79d8ee77e016a
-
SHA256
b12328ae08738c6e4a5e73bb526aaf2f044dcf81ca459b6a8f62acbf1852528d
-
SHA512
0fe22bcf2195f690c627fd2249449850add300fc28db174634b8b974bdfd5aef29d51979a14a969a5b24da399bc61d8a9179b0c7b6dbe45cf59915407bae30fb
-
SSDEEP
3072:Ucop+QPx9OrHHX0U1qGQp2h4BSVdXN2TdPyw1lsZ7Zrwyy84:Pop+QWnD1qG22+MrQg6L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b12328ae08738c6e4a5e73bb526aaf2f044dcf81ca459b6a8f62acbf1852528d
Files
-
b12328ae08738c6e4a5e73bb526aaf2f044dcf81ca459b6a8f62acbf1852528d.exe windows x86
4905c16b56c6c2dde9b3bf949bc04295
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetCurrentProcess
GetEnvironmentStringsW
SetHandleInformation
AddConsoleAliasW
SetVolumeMountPointW
OpenSemaphoreA
GetSystemDefaultLCID
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GenerateConsoleCtrlEvent
GetConsoleAliasesLengthA
EnumTimeFormatsW
GetCommandLineA
TzSpecificLocalTimeToSystemTime
GetDriveTypeA
GetEnvironmentStrings
ActivateActCtx
GlobalAlloc
GetPrivateProfileIntA
LoadLibraryW
IsValidLocale
GetCalendarInfoA
SetVolumeMountPointA
SetConsoleCP
TerminateProcess
GetStartupInfoW
CreateJobObjectA
InterlockedExchange
FindFirstFileA
SetLastError
PeekConsoleInputW
EnumDateFormatsExA
MoveFileExA
RemoveDirectoryA
EnumSystemCodePagesW
GlobalGetAtomNameA
GlobalFree
GetNumaHighestNodeNumber
OpenMutexA
GetProcessId
UnhandledExceptionFilter
LocalAlloc
GetFileType
BuildCommDCBAndTimeoutsW
AddVectoredExceptionHandler
GetNumberFormatW
AddAtomW
GetProfileStringA
FindNextFileA
EnumDateFormatsA
GlobalUnWire
GetModuleHandleA
SetLocaleInfoW
FindNextFileW
CreateMailslotA
GetStringTypeW
VirtualProtect
GetCurrentDirectoryA
EnumDateFormatsW
FatalAppExitA
GetShortPathNameW
OpenSemaphoreW
FindFirstVolumeW
CreateFileW
ReadFile
GetConsoleAliasExesA
EnumResourceNamesW
GetCommandLineW
GetPrivateProfileSectionNamesW
MoveFileW
GetVolumeNameForVolumeMountPointA
WriteConsoleW
FlushFileBuffers
SetStdHandle
WideCharToMultiByte
InterlockedIncrement
InterlockedCompareExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
DeleteFileA
HeapSetInformation
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
GetProcAddress
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
CloseHandle
FreeEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
user32
GetMessagePos
gdi32
GetCharABCWidthsW
GetTextFaceW
SelectPalette
advapi32
LookupAccountSidW
shell32
DragFinish
ole32
CoGetInstanceFromFile
Sections
.text Size: 159KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ