_LoadEnvironment@0
Static task
static1
Behavioral task
behavioral1
Sample
d88603904a36e0c118677607ca65abdc0e885324a50583c6c87fd3005c42ffd1.zip
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d88603904a36e0c118677607ca65abdc0e885324a50583c6c87fd3005c42ffd1.zip
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
d88603904a36e0c118677607ca65abdc0e885324a50583c6c87fd3005c42ffd1.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
d88603904a36e0c118677607ca65abdc0e885324a50583c6c87fd3005c42ffd1.exe
Resource
win10v2004-20230915-en
General
-
Target
d88603904a36e0c118677607ca65abdc0e885324a50583c6c87fd3005c42ffd1
-
Size
109KB
-
MD5
641345465f864c166fbbb8ba9d2ced8f
-
SHA1
c62501b3d2bfa58d24b9c47de0408b9b1e679f51
-
SHA256
20a664d10a985a5915fc05b4c4c1d1e19bfa14ecddcbdd22a4df720f7db51642
-
SHA512
5a519933f08e36d5f0af3c1b4662f1ebb3a035a86e4fc88fcbb3345206143318ae6708d52b539d878309cbef826a4127dca75704f86fcd6a6c831b8b6d3bbc73
-
SSDEEP
3072:XPmjsZRK5ukV7Wv1MH09+zah7ocdsLRtFU4y/mOq:ejM+Wv1MHRlas1t1wq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d88603904a36e0c118677607ca65abdc0e885324a50583c6c87fd3005c42ffd1
Files
-
d88603904a36e0c118677607ca65abdc0e885324a50583c6c87fd3005c42ffd1.zip .ps1
-
d88603904a36e0c118677607ca65abdc0e885324a50583c6c87fd3005c42ffd1.exe windows:6 windows x86
f206bf4934412e0139dfd76edfc7dab0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetClipCursor
ole32
CoGetApartmentType
CoGetObjectContext
advapi32
RegDisablePredefinedCacheEx
RegCloseKey
DeleteAce
kernel32
CreateFileW
WriteConsoleW
ResetEvent
FreeConsole
RaiseException
CloseHandle
WaitForSingleObjectEx
GetCurrentThreadId
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceBeginInitialize
InitOnceComplete
GetLastError
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
DecodePointer
CreateEventW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
InitializeSListHead
HeapReAlloc
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetFileType
GetFileSizeEx
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
Exports
Exports
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ