Static task
static1
Behavioral task
behavioral1
Sample
d54bddf9337b3dbc48dc4c4b79b81b9d4924b08223598a3d21fe4fa721aec97d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d54bddf9337b3dbc48dc4c4b79b81b9d4924b08223598a3d21fe4fa721aec97d.exe
Resource
win10v2004-20231023-en
General
-
Target
d54bddf9337b3dbc48dc4c4b79b81b9d4924b08223598a3d21fe4fa721aec97d
-
Size
25KB
-
MD5
97e1f67b5e75e7fe2813c3712ec9e1b0
-
SHA1
73c750e55d3034270f51c5b67458ebf45118e0be
-
SHA256
d54bddf9337b3dbc48dc4c4b79b81b9d4924b08223598a3d21fe4fa721aec97d
-
SHA512
e97c871390dbfd63a8a838726a2e20d39f1d78d56015ebd788867561c11ab3d42ef879e48b5b8084f4d1cb815fb78926b8584e2380145c11a16125fd7d0ac462
-
SSDEEP
384:8lHzuCKyNVwcFkwraOeirEQIZQzhVo7/k+vjQfBOflyIsrHw7HEPhOeF:u5VwcOwWtQ9VGk+v6BOtyIMekXF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d54bddf9337b3dbc48dc4c4b79b81b9d4924b08223598a3d21fe4fa721aec97d
Files
-
d54bddf9337b3dbc48dc4c4b79b81b9d4924b08223598a3d21fe4fa721aec97d.exe windows:6 windows x64
7f28897fca8ed0addcb849a4551c91a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCommandLineW
CloseHandle
GetLastError
SetLastError
WaitForSingleObject
GetCurrentProcess
CreateRemoteThread
GetExitCodeThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
IsWow64Process
GetProcAddress
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WideCharToMultiByte
MultiByteToWideChar
RaiseException
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
shell32
CommandLineToArgvW
ntdll
RtlImageNtHeader
LdrUnloadDll
LdrGetProcedureAddress
LdrLoadDll
swscanf_s
RtlUnicodeStringToAnsiString
LdrProcessRelocationBlock
wcslen
wcscpy_s
NtFreeVirtualMemory
NtAllocateVirtualMemory
NtProtectVirtualMemory
NtQueryVirtualMemory
strcpy_s
strcat_s
_wmakepath_s
_wsplitpath_s
RtlGetCurrentPeb
RtlAssert
RtlInitUnicodeString
memcpy
vcruntime140d
__C_specific_handler_noexcept
__vcrt_GetModuleFileNameW
__vcrt_LoadLibraryExW
__vcrt_GetModuleHandleW
ucrtbased
_CrtDbgReportW
__stdio_common_vsprintf_s
_CrtDbgReport
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 876B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rtc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ