Static task
static1
Behavioral task
behavioral1
Sample
878654c7b1aa116253b400d341d335863739e320528eebadea0d4f4a9bc5bd82.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
878654c7b1aa116253b400d341d335863739e320528eebadea0d4f4a9bc5bd82.exe
Resource
win10v2004-20230915-en
General
-
Target
878654c7b1aa116253b400d341d335863739e320528eebadea0d4f4a9bc5bd82
-
Size
737KB
-
MD5
41430e36d7da893fca88f0ba926ad586
-
SHA1
9a6e673bda2ace15cadd5413bc8a843b48072bd0
-
SHA256
878654c7b1aa116253b400d341d335863739e320528eebadea0d4f4a9bc5bd82
-
SHA512
40535726c4ca59935b753a1b3f655aeba014cc1ec623c681a1ff199b00df8bfc88f4f04036d4471b675719ebcaf000da82e1277d8c1a259bcac897f5e967c9d5
-
SSDEEP
12288:pY6i3NPS4cyWl4htI4c26mq0CwUbF14wN6J8uPruqBRNGIwOCWxAd319Y:pmal+tI4tq0CwU34C6JjPK2RN3bxEF9Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 878654c7b1aa116253b400d341d335863739e320528eebadea0d4f4a9bc5bd82
Files
-
878654c7b1aa116253b400d341d335863739e320528eebadea0d4f4a9bc5bd82.exe windows:5 windows x86
85f93ec750e6f7137bb7fe5a5261ac14
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
CreateFileA
SetThreadContext
PeekNamedPipe
VirtualQuery
SetEndOfFile
LoadResource
SetConsoleTextAttribute
OpenJobObjectA
GetLogicalDriveStringsW
GlobalLock
WriteConsoleInputA
CreateHardLinkA
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetDateFormatA
LoadLibraryW
IsValidLocale
GetFileAttributesA
FindNextVolumeW
ReplaceFileW
FileTimeToSystemTime
IsDBCSLeadByte
GetShortPathNameA
GetTempFileNameW
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
BackupWrite
BeginUpdateResourceA
FoldStringW
GetModuleHandleA
FindFirstChangeNotificationA
FindNextFileW
FindFirstVolumeA
CloseHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
LoadLibraryA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetLastError
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetStdHandle
user32
CharToOemBuffA
GetMenuItemID
GetKeyNameTextA
GetMessageExtraInfo
ChangeMenuA
GetParent
LoadMenuA
GetClassInfoExW
CopyIcon
LoadBitmapW
DdeQueryStringA
CloseWindow
gdi32
GetCharWidthI
Sections
.text Size: 680KB - Virtual size: 680KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ