Static task
static1
Behavioral task
behavioral1
Sample
d45926d890eed60099b30c3063bac40b89b219d4d7b7a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d45926d890eed60099b30c3063bac40b89b219d4d7b7a.exe
Resource
win10v2004-20230915-en
General
-
Target
d45926d890eed60099b30c3063bac40b89b219d4d7b7a.exe
-
Size
293KB
-
MD5
83410598ff9829688f54886ba98d6fee
-
SHA1
c3d08372596462142132832e7253481c187344ef
-
SHA256
d45926d890eed60099b30c3063bac40b89b219d4d7b7a7253ad312aba81704fc
-
SHA512
b690e652a49bab62479828461ba1fb849761ccb0c067e07c4978c2382af75ed3b81b7a453575663b3b10686c529a013522afa233066f163aa179d92205d765c8
-
SSDEEP
3072:hhLizWFuDv5p660AZFs5wYcPQIn2jn9CLO+LOnbkPYQ6cwj8/a4:ebDv5p660AZFs5wxNnQUWbkPYQ6F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d45926d890eed60099b30c3063bac40b89b219d4d7b7a.exe
Files
-
d45926d890eed60099b30c3063bac40b89b219d4d7b7a.exe.exe windows:5 windows x86
dbf0bd1564c8c042aee5632e8fe37af0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GetTempFileNameW
SetVolumeLabelA
FindResourceA
GetModuleHandleExA
GetLocaleInfoA
CommConfigDialogA
FindResourceExW
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
SetDefaultCommConfigW
QueryPerformanceCounter
GetEnvironmentStringsW
InterlockedCompareExchange
WriteConsoleInputA
SetComputerNameW
OpenSemaphoreA
CreateHardLinkA
FreeEnvironmentStringsA
SetTapeParameters
SetThreadUILanguage
GetConsoleAliasesA
GetConsoleAliasesLengthA
ConvertFiberToThread
GetConsoleTitleA
ReadConsoleW
GetCompressedFileSizeW
GetConsoleAliasExesW
WaitNamedPipeW
WriteFile
EnumTimeFormatsW
GetCommandLineA
GetDriveTypeA
GetVolumePathNameW
GetEnvironmentStrings
GetConsoleCP
GlobalAlloc
LoadLibraryW
GetConsoleMode
FatalAppExitW
ReadConsoleInputA
GetCalendarInfoW
GetCommandLineW
GetFileAttributesA
EnumSystemCodePagesA
SetSystemPowerState
IsDBCSLeadByte
CreateFileW
FindNextVolumeMountPointW
GetStartupInfoW
CreateMailslotW
GetShortPathNameA
GetNamedPipeHandleStateW
FindFirstFileA
GetLastError
SetLastError
ReadConsoleOutputCharacterA
RemoveDirectoryA
CopyFileA
FreeUserPhysicalPages
FindClose
GetAtomNameA
MoveFileA
BuildCommDCBAndTimeoutsW
GetCommMask
AddAtomA
HeapWalk
GetPrivateProfileSectionNamesA
GetOEMCP
FindNextFileA
_lread
GetModuleHandleA
GetStringTypeW
VirtualProtect
EnumDateFormatsW
QueryPerformanceFrequency
PeekConsoleInputA
GetShortPathNameW
SetCalendarInfoA
FindFirstVolumeA
GetWindowsDirectoryW
DeleteFileW
ReadConsoleOutputCharacterW
FlushFileBuffers
SetStdHandle
SetFilePointer
DeleteVolumeMountPointW
GetVolumeNameForVolumeMountPointA
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
DeleteFileA
WideCharToMultiByte
HeapReAlloc
HeapSetInformation
RaiseException
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
GetModuleFileNameW
EncodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
IsValidCodePage
SetHandleCount
GetFileType
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
RtlUnwind
LCMapStringW
MultiByteToWideChar
WriteConsoleW
user32
CharUpperA
CharUpperBuffA
gdi32
GetTextFaceA
winhttp
WinHttpWriteData
Sections
.text Size: 218KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kov Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zoxijax Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ