Static task
static1
Behavioral task
behavioral1
Sample
80a7e5d5b66ec9f9071537d0a2a74a8d20eabd1a5361c3b723ba2143496860b9.exe
Resource
win7-20230831-en
General
-
Target
80a7e5d5b66ec9f9071537d0a2a74a8d20eabd1a5361c3b723ba2143496860b9
-
Size
124KB
-
MD5
dd2e6915deda7b5dc444ebf68f2ffe4f
-
SHA1
2001d5dce86ef1c3f237913d8a8783cdbfbd0890
-
SHA256
d0d8561c13b82f99aadca25633a50648ee2f5e6d72cef3dec3abdcb66618e1f9
-
SHA512
7ff3aa404d411be94c5157b7b0cd4c82746c57c0b8c5d4ffa4bd30a9c76de86d66948f9966a5585568ca646df989ad76e65f69bfc10fc2939816394ea10625e7
-
SSDEEP
3072:lFs6U6b3rpQCXeEGqD/5LCHsVlCo2qlDq:l5Uk1ld0HS3lm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/80a7e5d5b66ec9f9071537d0a2a74a8d20eabd1a5361c3b723ba2143496860b9
Files
-
80a7e5d5b66ec9f9071537d0a2a74a8d20eabd1a5361c3b723ba2143496860b9.zip
-
80a7e5d5b66ec9f9071537d0a2a74a8d20eabd1a5361c3b723ba2143496860b9.exe windows:5 windows x86
2bafe46def2ec56576b67e09f498b01e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
SetDefaultCommConfigA
GetConsoleAliasesLengthW
GetLocaleInfoA
GetConsoleAliasExesA
CommConfigDialogA
FindResourceW
BuildCommDCBAndTimeoutsA
MapUserPhysicalPages
ReadConsoleA
InterlockedDecrement
QueryPerformanceCounter
GetEnvironmentStringsW
GetModuleHandleExW
GetUserDefaultLCID
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
FindNextVolumeMountPointA
ConvertFiberToThread
GetWindowsDirectoryA
GetCompressedFileSizeW
WaitNamedPipeW
EnumTimeFormatsA
WriteFile
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
FindResourceExA
GetConsoleCP
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
SetConsoleCP
DeleteVolumeMountPointW
EnumSystemCodePagesA
GetFileAttributesW
SetSystemPowerState
GetAtomNameW
GetCommandLineW
GetACP
GetVolumePathNameA
GetStartupInfoW
GetNamedPipeHandleStateW
GetConsoleAliasesW
FindFirstFileA
OpenMutexW
GetLastError
SetLastError
PeekConsoleInputW
VerLanguageNameA
SetVolumeLabelW
HeapUnlock
MoveFileW
CopyFileA
GetTempFileNameA
FindClose
LoadLibraryA
LocalAlloc
CreateHardLinkW
AddAtomW
RemoveDirectoryW
OpenJobObjectW
SetCommMask
GetTapeParameters
FoldStringW
GetPrivateProfileSectionNamesA
FindNextFileA
GetModuleHandleA
GetStringTypeW
GetConsoleTitleW
VirtualProtect
FatalAppExitA
GetShortPathNameW
SetCalendarInfoA
OpenSemaphoreW
FindFirstVolumeW
ReadConsoleOutputCharacterW
DeleteFileA
SetFilePointer
FlushFileBuffers
SetStdHandle
CreateFileW
GetVolumeNameForVolumeMountPointA
MoveFileA
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WideCharToMultiByte
HeapReAlloc
HeapSetInformation
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
GetModuleFileNameW
EncodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetOEMCP
IsValidCodePage
CloseHandle
FreeEnvironmentStringsW
SetHandleCount
GetFileType
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
RtlUnwind
LCMapStringW
MultiByteToWideChar
RaiseException
WriteConsoleW
user32
CharUpperBuffA
CharUpperW
gdi32
GetTextFaceA
winhttp
WinHttpWriteData
Sections
.text Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zecu Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.moj Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ