Static task
static1
Behavioral task
behavioral1
Sample
b75c324aa2aee8f7a3d56cffd5f97def33684fad543984282610f4f3804772bb.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b75c324aa2aee8f7a3d56cffd5f97def33684fad543984282610f4f3804772bb.exe
Resource
win10v2004-20230915-en
General
-
Target
b75c324aa2aee8f7a3d56cffd5f97def33684fad543984282610f4f3804772bb
-
Size
398KB
-
MD5
50fda9cb611b07db7fec3c8fd5a88242
-
SHA1
bb73505894ebc629a9a510441f1dcf5fb5bb9de1
-
SHA256
b75c324aa2aee8f7a3d56cffd5f97def33684fad543984282610f4f3804772bb
-
SHA512
620ecdd71afba559de83cd8e7d0bb572b4655fa874fa470beb5df909f72a05000b2d243ee3d79cb48797f482520d9028f0e288da449f78d3074340cd93de69da
-
SSDEEP
6144:4mhEP0SjTUy05K+Oz4QuGNSn408mQg7aGwPvPbc6lc4DKkZyd9T7Gfp:00SjTUy0JvE0LVWGwHPbcGckZiTI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b75c324aa2aee8f7a3d56cffd5f97def33684fad543984282610f4f3804772bb
Files
-
b75c324aa2aee8f7a3d56cffd5f97def33684fad543984282610f4f3804772bb.exe windows x86
202e6a315b3c51553ae3fadd577f89e5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
SetFileTime
CloseHandle
CreateDirectoryW
RemoveDirectoryW
CreateFileW
DeleteFileW
CreateHardLinkW
GetShortPathNameW
GetLongPathNameW
MoveFileW
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
GetCurrentProcessId
GetDriveTypeW
GetDiskFreeSpaceExW
SetFileAttributesW
GetFileAttributesW
GetVolumeInformationW
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
InterlockedDecrement
GetVersionExW
GetModuleFileNameW
GetCurrentDirectoryW
GetFullPathNameW
FoldStringW
SetErrorMode
GetModuleHandleW
FreeLibrary
LoadLibraryW
LoadLibraryExW
GetProcAddress
GetCurrentProcess
GetCurrentThread
SetThreadPriority
SetThreadExecutionState
CreateEventW
GetSystemDirectoryW
SetPriorityClass
GetProcessAffinityMask
CreateThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreW
GetSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
GetCPInfo
IsDBCSLeadByte
MultiByteToWideChar
WideCharToMultiByte
CompareStringW
GetConsoleCP
LCMapStringW
DecodePointer
HeapSize
SetFilePointerEx
SetConsoleCtrlHandler
FormatMessageW
Sleep
SetLastError
GetLastError
WriteConsoleW
ReadConsoleW
SetConsoleMode
GetConsoleMode
WriteFile
GetStdHandle
GetFileType
GetCommandLineW
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
GetStringTypeW
HeapAlloc
FindNextFileA
FindFirstFileExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
LocalFree
RtlUnwind
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
QueryPerformanceFrequency
GetModuleFileNameA
GetCommandLineA
GetACP
HeapFree
HeapReAlloc
SetStdHandle
user32
OemToCharA
CharToOemA
OemToCharBuffA
MessageBeep
CharLowerW
CharUpperW
ExitWindowsEx
LoadStringW
CharToOemBuffW
advapi32
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
LookupPrivilegeValueW
SetFileSecurityW
AdjustTokenPrivileges
OpenProcessToken
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetMalloc
ole32
CoCreateInstance
CoSetProxyBlanket
oleaut32
SysFreeString
SysAllocString
VariantClear
powrprof
SetSuspendState
Sections
.text Size: 291KB - Virtual size: 290KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ