Static task
static1
Behavioral task
behavioral1
Sample
205a978cb3dab35f0121d5ed1bcb6b7179459ceed9621799941fa322a5d942ba.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
205a978cb3dab35f0121d5ed1bcb6b7179459ceed9621799941fa322a5d942ba.exe
Resource
win10v2004-20230915-en
General
-
Target
205a978cb3dab35f0121d5ed1bcb6b7179459ceed9621799941fa322a5d942ba
-
Size
399KB
-
MD5
075e9e484427fb0db882907bee25d66b
-
SHA1
4ecec95a068456db0eaf4777063be3f2d5ae4220
-
SHA256
205a978cb3dab35f0121d5ed1bcb6b7179459ceed9621799941fa322a5d942ba
-
SHA512
25d57cd90d18cc95451af30a0012a154f404d9f7ecd36f5b1859421a0f819804140c2883850c9b5997d79fda6a50e7825f9c5ac03456db60853ab5549cab8994
-
SSDEEP
6144:bhlz0sa16yVtBmOaI9aXJF7mHr3NJd11/Ch7KpkKYznrBDJppACC45zpRBI403go:bhlAs74tRl9x3N38Rz9DW45jC4u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 205a978cb3dab35f0121d5ed1bcb6b7179459ceed9621799941fa322a5d942ba
Files
-
205a978cb3dab35f0121d5ed1bcb6b7179459ceed9621799941fa322a5d942ba.exe windows:5 windows x64
9a3fd0d5c7ee877d3223332fb22a7cf5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
DeviceIoControl
SetFileTime
CloseHandle
CreateDirectoryW
RemoveDirectoryW
CreateFileW
DeleteFileW
CreateHardLinkW
GetShortPathNameW
GetLongPathNameW
MoveFileW
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
GetCurrentProcessId
GetDriveTypeW
GetDiskFreeSpaceExW
SetFileAttributesW
GetFileAttributesW
GetVolumeInformationW
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
GetVersionExW
GetModuleFileNameW
GetCurrentDirectoryW
GetFullPathNameW
FoldStringW
SetErrorMode
GetModuleHandleW
FreeLibrary
LoadLibraryW
LoadLibraryExW
GetProcAddress
GetCurrentProcess
SetThreadPriority
SetThreadExecutionState
CreateEventW
GetSystemDirectoryW
SetPriorityClass
GetProcessAffinityMask
CreateThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreW
GetSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
GetCPInfo
IsDBCSLeadByte
MultiByteToWideChar
WideCharToMultiByte
CompareStringW
HeapSize
SetFilePointerEx
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
SetConsoleCtrlHandler
FormatMessageW
Sleep
SetLastError
GetLastError
WriteConsoleW
ReadConsoleW
SetConsoleMode
GetConsoleMode
WriteFile
GetStdHandle
GetFileType
GetCurrentThread
GetCommandLineW
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetStdHandle
GetConsoleCP
LCMapStringW
GetStringTypeW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
LocalFree
RtlUnwindEx
RtlPcToFileHeader
RaiseException
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
QueryPerformanceFrequency
GetModuleFileNameA
GetCommandLineA
GetACP
HeapFree
HeapReAlloc
HeapAlloc
user32
ExitWindowsEx
LoadStringW
CharUpperW
CharToOemA
OemToCharBuffA
OemToCharA
CharLowerW
MessageBeep
CharToOemBuffW
advapi32
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
LookupPrivilegeValueW
SetFileSecurityW
AdjustTokenPrivileges
OpenProcessToken
shell32
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetMalloc
ole32
CoCreateInstance
CoSetProxyBlanket
oleaut32
VariantClear
SysFreeString
SysAllocString
powrprof
SetSuspendState
Sections
.text Size: 278KB - Virtual size: 278KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ