Static task
static1
Behavioral task
behavioral1
Sample
49a9106c4e086e526474a0b04585298c4d4ca92f73dc286e6231a15ff2a425ed.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
49a9106c4e086e526474a0b04585298c4d4ca92f73dc286e6231a15ff2a425ed.exe
Resource
win10v2004-20230915-en
General
-
Target
49a9106c4e086e526474a0b04585298c4d4ca92f73dc286e6231a15ff2a425ed
-
Size
129KB
-
MD5
e7456e400594a034db3e46855bbf7290
-
SHA1
6dd067b414c8ee61b492f379f21911bd111d5cfb
-
SHA256
f9adaa270f9cc28adb95163d23b14454f6f93331873e404e6d1ebf93d81499cd
-
SHA512
3c60f82c62cdcc82b7e7dfa7d0fbd727c676c5e3820abba34e1696426d3ae1f1399ce502ccb481efb1a1abb8df4ebad7ac0a6e3cca91e9d8a0ae7660d479dc5a
-
SSDEEP
3072:lfXNTcsg5CSYiiRchF6a6c7Wv1u43D3/hr8t:lfxcZ5ClmF6dTZ8t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/49a9106c4e086e526474a0b04585298c4d4ca92f73dc286e6231a15ff2a425ed
Files
-
49a9106c4e086e526474a0b04585298c4d4ca92f73dc286e6231a15ff2a425ed.zip
-
49a9106c4e086e526474a0b04585298c4d4ca92f73dc286e6231a15ff2a425ed.exe windows:5 windows x86
617dba27a346caba173e42b5405eeac8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GetConsoleAliasesLengthW
GetLocaleInfoA
GetConsoleAliasExesA
CommConfigDialogA
FindResourceW
BuildCommDCBAndTimeoutsA
MapUserPhysicalPages
InterlockedDecrement
WaitNamedPipeA
SetDefaultCommConfigW
QueryPerformanceCounter
GetEnvironmentStringsW
GetModuleHandleExW
GetUserDefaultLCID
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
FindNextVolumeMountPointA
ConvertFiberToThread
ReadConsoleW
GetWindowsDirectoryA
GetCompressedFileSizeW
EnumTimeFormatsA
WriteFile
EnumTimeFormatsW
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
FindResourceExA
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
SetConsoleCP
DeleteVolumeMountPointW
GetFileAttributesW
SetSystemPowerState
CreateFileW
GetACP
GetCommandLineW
GetStartupInfoW
GetNamedPipeHandleStateW
GetConsoleAliasesW
FindFirstFileA
OpenMutexW
GetLastError
SetLastError
PeekConsoleInputW
VerLanguageNameA
SetVolumeLabelW
HeapUnlock
MoveFileW
CopyFileA
EnumSystemCodePagesW
GetTempFileNameA
FindClose
GetAtomNameA
LoadLibraryA
LocalAlloc
CreateHardLinkW
AddAtomW
RemoveDirectoryW
OpenJobObjectW
SetCommMask
GetTapeParameters
FoldStringW
GetPrivateProfileSectionNamesA
FindNextFileA
GetModuleHandleA
GetStringTypeW
GetConsoleTitleW
VirtualProtect
FatalAppExitA
GetShortPathNameW
SetCalendarInfoA
OpenSemaphoreW
FindFirstVolumeW
ReadConsoleOutputCharacterW
DeleteFileA
SetFilePointer
ReadFile
FlushFileBuffers
GetVolumePathNameA
GetVolumeNameForVolumeMountPointA
GetConsoleCP
SetStdHandle
MoveFileA
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WideCharToMultiByte
HeapReAlloc
HeapSetInformation
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
GetModuleFileNameW
EncodePointer
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetOEMCP
IsValidCodePage
CloseHandle
FreeEnvironmentStringsW
SetHandleCount
GetFileType
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
MultiByteToWideChar
HeapSize
LCMapStringW
RaiseException
WriteConsoleW
user32
CharUpperBuffA
CharUpperW
gdi32
GetTextFaceA
winhttp
WinHttpWriteData
Sections
.text Size: 225KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zicemo Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wiza Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ