Static task
static1
Behavioral task
behavioral1
Sample
a641234ba844fe39e804bdeb6f002cbe15e9249f88fbd719593bd35b34dd3ddf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a641234ba844fe39e804bdeb6f002cbe15e9249f88fbd719593bd35b34dd3ddf.exe
Resource
win10v2004-20230915-en
General
-
Target
a641234ba844fe39e804bdeb6f002cbe15e9249f88fbd719593bd35b34dd3ddf
-
Size
233KB
-
MD5
2118225141f3268de7a558863db02957
-
SHA1
9731ab5977ed865e848ce0f9e65aae4862491d58
-
SHA256
a641234ba844fe39e804bdeb6f002cbe15e9249f88fbd719593bd35b34dd3ddf
-
SHA512
8749b4242d5912a532329887c5d57126b5f46b76e01d7edcca3f4f9080cfa940373bc7aea29e90efa7c747319c6e1b8cde3078cbd9985a88ab08020aca04956e
-
SSDEEP
3072:bLlrfSAzjin9TRITtDYe9lB2PfvQXqC63mdT2VB3auZbE5vq4J:bLlrKAy9TRITtMe3QPH9oShkq4J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a641234ba844fe39e804bdeb6f002cbe15e9249f88fbd719593bd35b34dd3ddf
Files
-
a641234ba844fe39e804bdeb6f002cbe15e9249f88fbd719593bd35b34dd3ddf.exe windows:5 windows x64
8b1a3e8dfc15d483f9cd59537177dbee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleFileNameW
lstrlenW
GetProcAddress
VirtualAlloc
FindClose
Process32FirstW
LoadLibraryW
CreateToolhelp32Snapshot
CloseHandle
LocalAlloc
WideCharToMultiByte
GetCurrentProcess
Process32NextW
FindFirstFileW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetModuleHandleW
ExitProcess
GetCommandLineA
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
RtlUnwindEx
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
HeapSetInformation
GetVersion
HeapCreate
WriteFile
GetStdHandle
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSize
ReadFile
GetConsoleCP
GetConsoleMode
FreeLibrary
GetLocaleInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FlushFileBuffers
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetStdHandle
CreateFileA
WriteConsoleW
SetEndOfFile
GetProcessHeap
CreateFileW
LoadLibraryA
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ