Static task
static1
Behavioral task
behavioral1
Sample
74c461fbd9854d252d7788af08141e330905650d99ca3375dfa69ef6c51be270.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
74c461fbd9854d252d7788af08141e330905650d99ca3375dfa69ef6c51be270.exe
Resource
win10v2004-20231020-en
General
-
Target
74c461fbd9854d252d7788af08141e330905650d99ca3375dfa69ef6c51be270
-
Size
469KB
-
MD5
cc3b4e0887128c68914b68ad3a27ae54
-
SHA1
c3e984098090707af5ea8e33f154797ce8d7af08
-
SHA256
74c461fbd9854d252d7788af08141e330905650d99ca3375dfa69ef6c51be270
-
SHA512
0613af2526c12387e4f0b4c61f19e89403ea12ed5983164b2f256b7a9b526349f28569324ead86ac1ce2f4f078ad928954cccfa1190d9f2fa2acb7419e8c71c6
-
SSDEEP
12288:2gtnzPzpzd9uK05Q9zCz92qN8+ZECz92qNm9zCz92qNsCz92qJd9vlux:2gdjX9z0i3q3Z4qk3qWqJXi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74c461fbd9854d252d7788af08141e330905650d99ca3375dfa69ef6c51be270
Files
-
74c461fbd9854d252d7788af08141e330905650d99ca3375dfa69ef6c51be270.exe windows:5 windows x86
11e7299ab670702a66b1dd0284426ea1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
VirtualProtect
VirtualQuery
FreeLibrary
GetModuleHandleW
GetProcAddress
GetLastError
CreateFileA
CloseHandle
GetCurrentDirectoryA
GetFileAttributesA
GetModuleFileNameA
MultiByteToWideChar
GetFileAttributesExW
LoadLibraryA
RaiseException
QueryPerformanceCounter
QueryPerformanceFrequency
Sleep
GetCurrentThreadId
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
InitializeSListHead
SetEvent
EncodePointer
GetCurrentThread
GetThreadTimes
GetModuleFileNameW
LoadLibraryExW
RtlUnwind
GetModuleHandleExW
ExitProcess
GetStdHandle
WriteFile
HeapAlloc
HeapFree
LCMapStringW
GetFileType
SetFilePointerEx
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
HeapSize
HeapReAlloc
ReadFile
ReadConsoleW
DecodePointer
CreateFileW
WriteConsoleW
SetEndOfFile
advapi32
TraceMessage
shlwapi
PathIsRelativeA
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
XPMDhTwL Size: 5KB - Virtual size: 4KB
AhfbRKXk Size: 30KB - Virtual size: 29KB
aVmERZXM Size: 88KB - Virtual size: 88KB
QrmTERAc Size: 6KB - Virtual size: 6KB
PEXYqQEz Size: 1KB - Virtual size: 1KB
CowKKJkR Size: 512B - Virtual size: 350B
brTkbJwr Size: 15KB - Virtual size: 14KB
vxCpnrPW Size: 4KB - Virtual size: 4KB
wvUQJBIq Size: 29KB - Virtual size: 28KB
huSRcaLy Size: 29KB - Virtual size: 29KB