Static task
static1
Behavioral task
behavioral1
Sample
36b6ae5caf534c58a8af7b487ab2e6516e52fbcc8f0addf6f737fed46be5f717.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
36b6ae5caf534c58a8af7b487ab2e6516e52fbcc8f0addf6f737fed46be5f717.exe
Resource
win10v2004-20231020-en
General
-
Target
36b6ae5caf534c58a8af7b487ab2e6516e52fbcc8f0addf6f737fed46be5f717
-
Size
25KB
-
MD5
3e9fb4e5c1aea5c77ea93ee8fc664083
-
SHA1
f08e13c4cc10396cf5db27e7307ae19e8a1d488b
-
SHA256
36b6ae5caf534c58a8af7b487ab2e6516e52fbcc8f0addf6f737fed46be5f717
-
SHA512
5cad0ffda049f24602dab37698e1ae71be26d918b5032ee8f399ffe68a31ce9fc0c3641d59988f178f2a940c27c4c0d82e114ab64875ef9c5148b35efc3bd99d
-
SSDEEP
384:GAkPuCKy73yc0S+4daxdZcYLisWA7iTg7V24MNQfBGf1UpF/Ww/HQ:GR/yc3gxbfWYco24MMBGSpF/tw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36b6ae5caf534c58a8af7b487ab2e6516e52fbcc8f0addf6f737fed46be5f717
Files
-
36b6ae5caf534c58a8af7b487ab2e6516e52fbcc8f0addf6f737fed46be5f717.exe windows:6 windows x64
a8fb6506fb8529979a43790646acee19
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCommandLineW
CloseHandle
GetLastError
SetLastError
WaitForSingleObject
GetCurrentProcess
GetCurrentProcessId
CreateRemoteThread
GetExitCodeThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
VirtualFreeEx
IsWow64Process
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RaiseException
shell32
CommandLineToArgvW
ntdll
DbgPrint
RtlAssert
NtQueryVirtualMemory
NtProtectVirtualMemory
NtAllocateVirtualMemory
NtFreeVirtualMemory
LdrProcessRelocationBlock
RtlImageNtHeader
LdrUnloadDll
LdrGetProcedureAddress
LdrLoadDll
swscanf_s
RtlUnicodeStringToAnsiString
RtlInitUnicodeString
strcpy_s
strcat_s
_wmakepath_s
_wsplitpath_s
wcslen
wcscpy_s
memcpy
RtlGetCurrentPeb
vcruntime140d
__vcrt_GetModuleHandleW
__vcrt_GetModuleFileNameW
__C_specific_handler_noexcept
__vcrt_LoadLibraryExW
ucrtbased
_CrtDbgReportW
__stdio_common_vsprintf_s
_CrtDbgReport
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 876B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rtc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ