Static task
static1
Behavioral task
behavioral1
Sample
1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe
Resource
win10v2004-20230915-en
General
-
Target
1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
-
Size
337KB
-
MD5
b216e5f4f710a3383c355f738e1cfeff
-
SHA1
8ea0c462d67c04935ceb231625a7583d408d78d2
-
SHA256
1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
-
SHA512
a755c95df1123fef8a1690fc117ff1933473f4725c513c613b22c82bd38e24f2d4aa890056a02bed4ebf4b517bff9513e5a33bfc7a19c509e685770044d33311
-
SSDEEP
6144:riDLXvujLfRwDDRCRYA1O+3w8DkhYmJzRy2:riD7Gf5iRCRYaBpDxIzt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7
Files
-
1f09ea74aef6369c20f58da63812d6a76f048038748340e253e575be4d2664b7.exe windows x86
e1addd52065e05b88dc6e5d0e9798033
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
TerminateThread
TerminateProcess
GetMailslotInfo
ExitThread
GetProcAddress
GlobalAlloc
OutputDebugStringA
CompareStringW
CompareStringA
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetSystemTimes
GetCPInfo
AddAtomW
GlobalMemoryStatus
GetStartupInfoW
RaiseException
RtlUnwind
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
VirtualAlloc
HeapReAlloc
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
HeapSize
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetACP
GetOEMCP
IsValidCodePage
CreateFileA
CloseHandle
GetLocaleInfoW
GetLocaleInfoA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
user32
ShowWindow
FindWindowA
GetMonitorInfoW
GetDC
gdi32
FlattenPath
GetGraphicsMode
BeginPath
Sections
.text Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ejoisjc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE