Static task
static1
Behavioral task
behavioral1
Sample
1f681911023f62d41031afbbf99813327a860a780ccd5e2157bacc867672b651.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
1f681911023f62d41031afbbf99813327a860a780ccd5e2157bacc867672b651.exe
Resource
win10v2004-20231020-en
General
-
Target
1f681911023f62d41031afbbf99813327a860a780ccd5e2157bacc867672b651
-
Size
209KB
-
MD5
5dd67a6af4ceebddc87a3a122fdae736
-
SHA1
7199c15555fe42a8695658a94102ea14a0dfdd9e
-
SHA256
1f681911023f62d41031afbbf99813327a860a780ccd5e2157bacc867672b651
-
SHA512
12022a60cf256c1f095ac1fc7b70d02863d88c6c6371d8db4808527b3006baac87ba4cdf9101dc25ced96b12cf8e1e1a139d6d17d280c5b3829779734bc8b995
-
SSDEEP
3072:7zMWtZdhlGQVg7MK1DYvq/Lp63JqhVeI7KiZDFzq8G+xtAoowsNRvBigZcB+R:HMqZdXTVgYEQq/V6ZeVM+DF7fuwG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f681911023f62d41031afbbf99813327a860a780ccd5e2157bacc867672b651
Files
-
1f681911023f62d41031afbbf99813327a860a780ccd5e2157bacc867672b651.exe windows:6 windows x86
f14e36ed9fa8b936ce98dcaba45524ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
OpenProcess
GetWindowsDirectoryW
VirtualAlloc
VirtualFree
GetCurrentProcess
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LocalAlloc
FormatMessageW
WriteConsoleW
GetLastError
ReadProcessMemory
CloseHandle
CreateFileW
HeapSize
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
LocalFree
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetStringTypeW
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
GetFileType
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
advapi32
OpenProcessToken
GetTokenInformation
ole32
CoInitializeEx
CLSIDFromString
CoGetObject
CoUninitialize
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
wininet
InternetCloseHandle
InternetOpenUrlW
InternetReadFile
InternetOpenW
Sections
.text Size: 150KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ