Static task
static1
Behavioral task
behavioral1
Sample
a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8.exe
Resource
win10-20230915-en
General
-
Target
a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8
-
Size
202KB
-
MD5
63efb435f4e4d80babcf8765acef323f
-
SHA1
83d62ffb409753c92b859a841b1ffaa105aa195b
-
SHA256
a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8
-
SHA512
cf1d66d03877e9e199561a049a73dbc3c62ebe4abf66b2add032beb6cc037ba7d408a7355d635a1416013da00850a0550b4b9423f70d30fe761d09908a4b2d9c
-
SSDEEP
3072:wqXWtMfafSRoT0CsV3aUjjMU7vaTSCGwsGG5u4zpe2:PMMieoT0CsV3VcEv+SC4z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8
Files
-
a23df2fd3d2e57b1c0168c24f3b791fc51d65bae99570ee3fe18c31a6689a6d8.exe windows x86
8a5878408e89d1fd5731f7a33cc8a29b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameW
EnumResourceNamesW
SetFilePointer
PeekNamedPipe
SetConsoleTextAttribute
OpenJobObjectA
GlobalLock
WriteConsoleInputA
CreateHardLinkA
FreeEnvironmentStringsA
GetTickCount
GetDateFormatA
LoadLibraryW
SizeofResource
GetFileAttributesA
FileTimeToSystemTime
GetGeoInfoA
CreateFileW
SetThreadPriority
GetLogicalDriveStringsA
GetLastError
GetThreadContext
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
BackupWrite
InterlockedExchangeAdd
CreateHardLinkW
FoldStringW
GetModuleFileNameA
FindNextFileA
FindFirstChangeNotificationA
GetShortPathNameW
OpenSemaphoreW
FindFirstVolumeW
GetConsoleProcessList
FindNextVolumeA
HeapSize
ReadConsoleOutputCharacterA
HeapFree
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
RtlUnwind
MultiByteToWideChar
ReadFile
SetHandleCount
GetStdHandle
GetFileType
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
SetStdHandle
GetModuleHandleA
GetConsoleCP
GetConsoleMode
LoadLibraryA
RaiseException
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
SetEndOfFile
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
GetClassInfoExA
GetMessageExtraInfo
LoadMenuA
CharToOemBuffA
advapi32
InitiateSystemShutdownA
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ