Static task
static1
Behavioral task
behavioral1
Sample
416862943398efd038f083988018c32b3973a14edca9b8511ebafa056507850c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
416862943398efd038f083988018c32b3973a14edca9b8511ebafa056507850c.exe
Resource
win10v2004-20230915-en
General
-
Target
416862943398efd038f083988018c32b3973a14edca9b8511ebafa056507850c
-
Size
461KB
-
MD5
e9540426cfa05f062b0de2e1d1352bf3
-
SHA1
78d42fc4b9278fe1471edc9e14059d8eb99a07b4
-
SHA256
416862943398efd038f083988018c32b3973a14edca9b8511ebafa056507850c
-
SHA512
95ac3199614f1af3a4d84e72452f567989925b51abcf024e0e29ad8673e8d1ee3dbb9f57bcb2ea05b17768506a1f3f87591ef5f4ec430cec24053f1bc725842c
-
SSDEEP
12288:0UlnTEWG2x8HwAZLGf4t/+snzrTZOzZf47UrXcg:0UlnXQ5nzrVOze7U7cg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 416862943398efd038f083988018c32b3973a14edca9b8511ebafa056507850c
Files
-
416862943398efd038f083988018c32b3973a14edca9b8511ebafa056507850c.exe windows:5 windows x86
3722ade6e5c1e03a79417e182450ae78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDllDirectoryW
MoveFileW
CopyFileW
FreeLibrary
GetLastError
ExitProcess
GetCurrentProcessId
GetTickCount
SetThreadLocale
SetLastError
EnterCriticalSection
GetCurrentProcess
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateFileW
GetSystemDirectoryW
GetUserDefaultLCID
LoadLibraryW
DeleteCriticalSection
GetModuleHandleW
GetStdHandle
WriteConsoleA
WriteFile
OutputDebugStringA
GetCurrentThreadId
AttachConsole
OutputDebugStringW
WriteConsoleW
GetFileType
ReadFile
SetFileTime
UnmapViewOfFile
GetFileAttributesExW
CreateFileMappingA
MoveFileExW
GetFileSize
MapViewOfFile
GetFileTime
VirtualProtect
GetTempPathW
Sleep
SetEvent
GetVersionExA
GetEnvironmentStringsW
CreateProcessW
WideCharToMultiByte
RaiseException
GetSystemInfo
VirtualQuery
LoadLibraryExA
GetStringTypeW
EncodePointer
DecodePointer
GetCPInfo
CompareStringW
LCMapStringW
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
InitializeSListHead
RtlUnwind
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameA
GetACP
HeapFree
HeapAlloc
HeapReAlloc
IsValidLocale
EnumSystemLocalesW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
SetFilePointerEx
SetEndOfFile
ReadConsoleW
GetEnvironmentVariableW
GetProcAddress
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
DeleteFileW
GetFileAttributesW
FindClose
GetModuleFileNameW
RemoveDirectoryW
FindNextFileW
GetFullPathNameW
GetCommandLineW
FindFirstFileW
MultiByteToWideChar
CreateDirectoryW
Sections
.text Size: 331KB - Virtual size: 331KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ