Static task
static1
Behavioral task
behavioral1
Sample
1368de404eac1bc98be08973bb654066adcc85e04ea1115e07371d26ab2d29bd.exe
Resource
win10v2004-20230915-en
General
-
Target
1368de404eac1bc98be08973bb654066adcc85e04ea1115e07371d26ab2d29bd
-
Size
802KB
-
MD5
b9a5fd2402f7b841162e5571f5165128
-
SHA1
923856a3367e037e1df2e9e62c5f3d3d36964a92
-
SHA256
1368de404eac1bc98be08973bb654066adcc85e04ea1115e07371d26ab2d29bd
-
SHA512
133510107d540b43769efb556c4b035b4eb13ae0bace349875ef4519ae11c8c33ccf756be3e5989d55859d1572904310e35c930210505177c97f511b010bbc76
-
SSDEEP
12288:Dbl/auSpEhrcug5k3gKP6aSa5Yl8qnfqXdvlLwLZIT54LaCJsRB6p85eNtF:tSuSIpph9s8qfqXDJT59B6p8kjF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1368de404eac1bc98be08973bb654066adcc85e04ea1115e07371d26ab2d29bd
Files
-
1368de404eac1bc98be08973bb654066adcc85e04ea1115e07371d26ab2d29bd.exe windows:5 windows x86
c0a3c238d9ecfd3e9ab3d94bcbfed84e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameW
SetVolumeLabelA
SetDefaultCommConfigA
FindResourceA
GetModuleHandleExA
GetLocaleInfoA
CommConfigDialogA
FindResourceExW
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
QueryPerformanceCounter
GetEnvironmentStringsW
InterlockedCompareExchange
WriteConsoleInputA
SetComputerNameW
CreateHardLinkA
FreeEnvironmentStringsA
SetTapeParameters
SetThreadUILanguage
GetConsoleAliasesA
GetConsoleAliasesLengthA
ConvertFiberToThread
GetConsoleTitleA
ReadConsoleW
GetCompressedFileSizeW
GetConsoleAliasExesW
WaitNamedPipeW
WriteFile
EnumTimeFormatsW
GetCommandLineA
GetDriveTypeA
GetVolumePathNameW
GetEnvironmentStrings
GetConsoleCP
GlobalAlloc
LoadLibraryW
GetConsoleMode
FatalAppExitW
ReadConsoleInputA
GetCalendarInfoW
DeleteVolumeMountPointW
GetFileAttributesA
GetComputerNameA
SetSystemPowerState
IsDBCSLeadByte
CreateFileW
FindNextVolumeMountPointW
GetStartupInfoW
CreateMailslotW
GetShortPathNameA
GetNamedPipeHandleStateW
FindFirstFileA
GetLastError
SetLastError
ReadConsoleOutputCharacterA
RemoveDirectoryA
CopyFileA
FreeUserPhysicalPages
FindClose
GetAtomNameA
MoveFileA
BuildCommDCBAndTimeoutsW
GetCommMask
AddAtomA
HeapWalk
GetPrivateProfileSectionNamesA
GetOEMCP
FindNextFileA
_lread
GetModuleHandleA
GetStringTypeW
VirtualProtect
EnumDateFormatsW
QueryPerformanceFrequency
PeekConsoleInputA
GetShortPathNameW
SetCalendarInfoA
OpenSemaphoreW
FindFirstVolumeA
GetWindowsDirectoryW
DeleteFileW
ReadConsoleOutputCharacterW
FlushFileBuffers
SetStdHandle
EnumSystemCodePagesA
GetVolumeNameForVolumeMountPointA
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
DeleteFileA
WideCharToMultiByte
HeapReAlloc
GetCommandLineW
HeapSetInformation
RaiseException
IsProcessorFeaturePresent
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
IsValidCodePage
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
WriteConsoleW
user32
CharUpperA
CharUpperBuffA
gdi32
GetTextFaceA
winhttp
WinHttpWriteData
Sections
.text Size: 728KB - Virtual size: 727KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mux Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rafeyod Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ