Static task
static1
Behavioral task
behavioral1
Sample
d7022afea0531fc58d551bb70080a98bb1227305dd4e1970a382c7816dcf0edc.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d7022afea0531fc58d551bb70080a98bb1227305dd4e1970a382c7816dcf0edc.exe
Resource
win10-20231020-en
General
-
Target
d7022afea0531fc58d551bb70080a98bb1227305dd4e1970a382c7816dcf0edc
-
Size
549KB
-
MD5
338a01505588d3e0f9589f4b4c9096c7
-
SHA1
5a6e34c12a2f0f994e3ab2f65a325fb0055a6148
-
SHA256
d7022afea0531fc58d551bb70080a98bb1227305dd4e1970a382c7816dcf0edc
-
SHA512
8ef217bfb1f0e6ff56c838626a112af79309089ac5761a638e4622dc0f8d5f7558902f773050f4242a81d5c436370c7296ac1d4888db19b847a19f9555fb6080
-
SSDEEP
6144:6oqVZxcbWinmW7vigmvvdndX+IIqe2j3mNwwO0HlRIKpeg8jjxicKYVe2rkF6e:GibWinPvkvLX+05j27dFjpeg8jjUF21
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7022afea0531fc58d551bb70080a98bb1227305dd4e1970a382c7816dcf0edc
Files
-
d7022afea0531fc58d551bb70080a98bb1227305dd4e1970a382c7816dcf0edc.exe windows:5 windows x86
62d1d6fe7c62fa5e4542bcc4847cfb03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
WriteConsoleOutputCharacterA
ReadConsoleA
GetConsoleAliasA
GetUserDefaultLCID
SetConsoleScreenBufferSize
WriteConsoleInputA
AddConsoleAliasW
OpenSemaphoreA
MoveFileWithProgressA
GetModuleHandleW
FindNextVolumeMountPointA
GetConsoleAliasExesW
WaitNamedPipeW
SetCommState
CreateActCtxW
GetEnvironmentStrings
GlobalFindAtomA
LoadLibraryW
SetCommConfig
FatalAppExitW
CopyFileW
_hread
CreateEventA
SetConsoleCP
GetFileAttributesA
GetExitCodeProcess
EnumSystemCodePagesA
SetSystemPowerState
TerminateProcess
GetCompressedFileSizeA
GetTimeZoneInformation
FindNextVolumeMountPointW
GetStartupInfoW
ReplaceFileA
GetTempPathW
WriteConsoleInputW
GetConsoleAliasesW
FindFirstFileA
GetLastError
GetCurrentDirectoryW
SetLastError
GlobalFree
GetPrivateProfileStringA
LoadLibraryA
LocalAlloc
IsWow64Process
MoveFileA
AddVectoredExceptionHandler
SetConsoleCtrlHandler
RemoveDirectoryW
SetFileApisToANSI
WriteProfileSectionW
VirtualLock
GlobalGetAtomNameW
GetCurrentConsoleFont
GetTapeParameters
FoldStringA
FindNextFileA
FindNextFileW
GetStringTypeW
VirtualProtect
CompareStringA
GetFileTime
QueryPerformanceFrequency
GetShortPathNameW
FindAtomW
GetWindowsDirectoryW
DeleteFileW
MoveFileWithProgressW
ResetWriteWatch
ReadConsoleOutputCharacterW
EnumSystemLocalesW
ExpandEnvironmentStringsW
WriteConsoleW
SetLocaleInfoA
EnumSystemLocalesA
GetNumaNodeProcessorMask
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
HeapFree
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetLocaleInfoA
IsValidLocale
HeapReAlloc
GetConsoleCP
GetConsoleMode
CreateFileW
user32
CharUpperA
advapi32
ClearEventLogA
AbortSystemShutdownW
winhttp
WinHttpReadData
Sections
.text Size: 486KB - Virtual size: 486KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ