Static task
static1
Behavioral task
behavioral1
Sample
d50239e7b387ac2c99380fbec5ab5ab1292445909dadf3e43917d29548ac0777.exe
Resource
win10v2004-20231127-en
General
-
Target
d50239e7b387ac2c99380fbec5ab5ab1292445909dadf3e43917d29548ac0777
-
Size
283KB
-
MD5
c0012c1800b20550f28adb0a6a049e37
-
SHA1
db0cdaa20c64ada59b86a97355ab518c75bbcf9a
-
SHA256
d50239e7b387ac2c99380fbec5ab5ab1292445909dadf3e43917d29548ac0777
-
SHA512
a7ba284c5009b26b207238e5e9cf79e50a16f830c5700e50581d3d193c0d09d395ef5b1ab15c55c2c74e5cda0c5b9cae7ac350cae05a2c7e3bb31e8ef34aa37a
-
SSDEEP
6144:rWdnk180YFHOTon78ruDTwJ6OLz6EzS2Lc:rWC+5OTEaH6UzDzS2L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d50239e7b387ac2c99380fbec5ab5ab1292445909dadf3e43917d29548ac0777
Files
-
d50239e7b387ac2c99380fbec5ab5ab1292445909dadf3e43917d29548ac0777.exe windows:5 windows x86 arch:x86
1fcfd50df8eeecb65b0f252bbcb19844
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
SetProcessAffinityMask
CreateFileA
GetFileSize
GetCommModemStatus
WriteConsoleInputW
WriteConsoleOutputCharacterW
BuildCommDCBAndTimeoutsA
InterlockedIncrement
ReadConsoleA
ZombifyActCtx
SetDefaultCommConfigW
GetNamedPipeHandleStateA
GetProfileSectionA
GetComputerNameW
GetProcessPriorityBoost
GetModuleHandleW
LocalFlags
GetPrivateProfileStringW
CreateActCtxW
GlobalAlloc
GetVolumeInformationA
GlobalFindAtomA
TerminateThread
SetConsoleCP
DeleteVolumeMountPointW
InterlockedPopEntrySList
GlobalFlags
GetConsoleAliasW
SetTimeZoneInformation
ReplaceFileA
CreateJobObjectA
GetLargestConsoleWindowSize
FindFirstFileA
GetLastError
SetLastError
GetProcAddress
SetFirmwareEnvironmentVariableW
VerLanguageNameW
LoadLibraryA
OpenWaitableTimerW
GetConsoleScreenBufferInfo
FoldStringA
WriteProfileStringA
GetProcessShutdownParameters
OpenFileMappingW
PeekConsoleInputA
GetCPInfoExA
SetProcessShutdownParameters
ReadConsoleInputW
GetWindowsDirectoryW
MoveFileWithProgressW
CloseHandle
WriteConsoleW
SetStdHandle
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
ExitProcess
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
IsProcessorFeaturePresent
HeapCreate
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CreateFileW
user32
CharUpperW
CharToOemBuffA
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ