Static task
static1
Behavioral task
behavioral1
Sample
35a17ec72cd4d4f29750b88030e08a1f6dc8827373ff4be7bba4385c29cc2f59.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
35a17ec72cd4d4f29750b88030e08a1f6dc8827373ff4be7bba4385c29cc2f59.exe
Resource
win10v2004-20230915-en
General
-
Target
35a17ec72cd4d4f29750b88030e08a1f6dc8827373ff4be7bba4385c29cc2f59
-
Size
415KB
-
MD5
c258a294856a82d374655727f6ebb9d0
-
SHA1
ab75b3706229bd11c3de8183b9f47f9f1bc45275
-
SHA256
35a17ec72cd4d4f29750b88030e08a1f6dc8827373ff4be7bba4385c29cc2f59
-
SHA512
c0a72295b846b4d5bda2f2809159f0d32dba31f12709f0fb431bb76b2c9e8b668eebb88f0c0731c5a2fce5d315b2490682648f22a838f8baa86f75f0d40cd6a4
-
SSDEEP
12288:bqHtK1IiSVcnTUGZvPhQ7sCcxRJOafldU0VGy1L7SlmGvSloP:+U1IiCcTUGplxSq/U0VGy1L7kol
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35a17ec72cd4d4f29750b88030e08a1f6dc8827373ff4be7bba4385c29cc2f59
Files
-
35a17ec72cd4d4f29750b88030e08a1f6dc8827373ff4be7bba4385c29cc2f59.exe windows:6 windows x64
511bb6725043ff70d171f48be0c4e6f0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileA
CloseHandle
GetComputerNameA
GetLastError
HeapWalk
CreateFiber
SwitchToFiber
CreateActCtxA
ActivateActCtx
DeactivateActCtx
CreateThread
GetModuleHandleA
WaitForSingleObject
GetStdHandle
ReadFile
SetFileAttributesA
ReleaseActCtx
WaitForMultipleObjects
CreateFileMappingA
MapViewOfFile
OpenFileMappingA
ExitProcess
VirtualAlloc
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
WriteFile
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
TerminateProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
SetStdHandle
GetFileType
GetStringTypeW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
CreateFileW
RaiseException
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 249KB - Virtual size: 249KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 84KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ