Static task
static1
Behavioral task
behavioral1
Sample
b7b9229dd39714ccd48104206c334a85a46f6e750a4c7a7a9c13b0ee46395ba3.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b7b9229dd39714ccd48104206c334a85a46f6e750a4c7a7a9c13b0ee46395ba3.exe
Resource
win10v2004-20231023-en
General
-
Target
b7b9229dd39714ccd48104206c334a85a46f6e750a4c7a7a9c13b0ee46395ba3
-
Size
151KB
-
MD5
da97c184cd7ff2eb1d727c007b8dfb75
-
SHA1
65cfbedd65934b53a1a433a2516f607cedd88c81
-
SHA256
04c327caf5ee4df872547c515916c3c7f9cc9b2e51fe08cddb56d1a23107bf50
-
SHA512
6c2ab2b47455a2e1e68007d65ffbe10da8f2ff78f85e8ec605bb7dc463be05f0479ba7dcd4ba3752c566c76c833907daeb5217c382502917879dade981690110
-
SSDEEP
3072:Pe39CnCzbwAf0G39ALLo6AUtxPEJZsSwdI8Yd58B8TMh7O:P+V/sFM3QdIRN9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/b7b9229dd39714ccd48104206c334a85a46f6e750a4c7a7a9c13b0ee46395ba3
Files
-
b7b9229dd39714ccd48104206c334a85a46f6e750a4c7a7a9c13b0ee46395ba3.zip
-
b7b9229dd39714ccd48104206c334a85a46f6e750a4c7a7a9c13b0ee46395ba3.exe windows:5 windows x86 arch:x86
bf239f08d0ec234f337a28373e606928
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
GetConsoleAliasExesLengthA
LoadResource
GlobalAddAtomA
EndUpdateResourceW
GetCurrentProcess
CreateJobObjectW
SignalObjectAndWait
GetModuleHandleW
GetTickCount
GetPrivateProfileStringW
GetWindowsDirectoryA
TzSpecificLocalTimeToSystemTime
GetVolumePathNameW
GlobalAlloc
LoadLibraryW
SetConsoleCursorPosition
LCMapStringA
GetConsoleAliasesW
OpenMutexW
GetLastError
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
EnumDateFormatsExA
RemoveDirectoryA
SetComputerNameA
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingW
AddVectoredExceptionHandler
FindFirstVolumeMountPointW
SetThreadIdealProcessor
FoldStringW
GlobalFindAtomW
GetModuleHandleA
HeapSetInformation
GetStringTypeW
CompareStringA
GetCurrentThreadId
SetFileShortNameA
CreateFileA
GetComputerNameA
GetDateFormatW
VirtualAlloc
DebugActiveProcess
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
user32
GetMessageExtraInfo
DdeQueryStringW
CharUpperW
gdi32
CreateCompatibleBitmap
GetDeviceGammaRamp
advapi32
SetKernelObjectSecurity
shell32
ShellAboutW
ole32
StringFromCLSID
Sections
.text Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 38.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ