DotNetRuntimeDebugHeader
Static task
static1
Behavioral task
behavioral1
Sample
480c40b5f2db0afbdfea03814510e4106ccac4fb4f7c3b694ddc0a09206d988e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
480c40b5f2db0afbdfea03814510e4106ccac4fb4f7c3b694ddc0a09206d988e.exe
Resource
win10v2004-20231127-en
General
-
Target
480c40b5f2db0afbdfea03814510e4106ccac4fb4f7c3b694ddc0a09206d988e
-
Size
5.2MB
-
MD5
6739c4558368ca1e2702256ff38b173e
-
SHA1
5c3fdc7abe581e99fd4b6e4dedc2df934dd6e571
-
SHA256
480c40b5f2db0afbdfea03814510e4106ccac4fb4f7c3b694ddc0a09206d988e
-
SHA512
59ba04a53948862f14eb66b24b7d96c5b333b111e31b85f7dc001ae5b9c644c80792cf520ffb0852067f4b8a84d160d6b2ff0fe6bed899a82fb13107fed05bcb
-
SSDEEP
49152:FST3/D3jRgpXQbrnX1bXDt5IR9HJhBwcA2fHPuFjyvx0UUeX0r4qCimrS9o2LEMt:ksrdMq5oqcXUfw/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 480c40b5f2db0afbdfea03814510e4106ccac4fb4f7c3b694ddc0a09206d988e
Files
-
480c40b5f2db0afbdfea03814510e4106ccac4fb4f7c3b694ddc0a09206d988e.exe windows:6 windows x64 arch:x64
176dc96b004227b21a8fc33a3798d7e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCloseKey
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegQueryValueExW
EventWrite
EventRegister
EventEnabled
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
bcrypt
BCryptGenRandom
BCryptEncrypt
BCryptImportKey
BCryptOpenAlgorithmProvider
BCryptSetProperty
BCryptCloseAlgorithmProvider
BCryptDestroyKey
BCryptDecrypt
kernel32
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
RtlPcToFileHeader
RaiseFailFastException
GetTickCount64
GetProcAddress
FindNLSStringEx
CompareStringEx
FindStringOrdinal
GetUserPreferredUILanguages
InitializeConditionVariable
WakeConditionVariable
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FileTimeToSystemTime
GetLastError
GetConsoleOutputCP
GetCurrentProcess
GetStdHandle
GetSystemTime
LocalAlloc
LocalFree
MultiByteToWideChar
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
WideCharToMultiByte
Sleep
WaitForMultipleObjectsEx
GetCurrentThread
LocaleNameToLCID
LCMapStringEx
CompareStringOrdinal
GetLocaleInfoEx
EnumTimeFormatsEx
GetCalendarInfoEx
EnumCalendarInfoExEx
ResolveLocaleName
SleepConditionVariableCS
ExpandEnvironmentStringsW
FindClose
FindFirstFileExW
FreeLibrary
GetFileAttributesExW
GetFullPathNameW
GetLongPathNameW
GetModuleFileNameW
GetSystemDirectoryW
LoadLibraryExW
SetThreadErrorMode
GetDynamicTimeZoneInformation
GetTimeZoneInformation
WriteFile
GetCurrentProcessorNumberEx
CloseHandle
SetEvent
CreateEventExW
GetEnvironmentVariableW
FormatMessageW
DuplicateHandle
GetThreadPriority
VirtualAllocEx
GetCPInfoExW
GetConsoleCP
GetConsoleMode
GetFileType
ReadFile
ReadConsoleW
ReadConsoleInputW
WriteConsoleW
FlushProcessWriteBuffers
GetCurrentThreadId
WaitForSingleObjectEx
VirtualQuery
RtlRestoreContext
AddVectoredExceptionHandler
FlsAlloc
FlsGetValue
FlsSetValue
CreateEventW
TerminateProcess
SwitchToThread
CreateThread
SetThreadPriority
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
QueryInformationJobObject
GetModuleHandleW
GetModuleHandleExW
GetProcessAffinityMask
InitializeContext
GetEnabledXStateFeatures
SetXStateFeaturesMask
InitializeCriticalSectionEx
GetSystemTimeAsFileTime
ResetEvent
DebugBreak
WaitForSingleObject
SleepEx
GlobalMemoryStatusEx
GetSystemInfo
GetLogicalProcessorInformation
GetLogicalProcessorInformationEx
GetLargePageMinimum
VirtualUnlock
VirtualAllocExNuma
IsProcessInJob
GetNumaHighestNodeNumber
GetProcessGroupAffinity
K32GetProcessMemoryInfo
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetCurrentProcessId
ole32
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoGetApartmentType
CoCreateGuid
CoWaitForMultipleHandles
CoInitializeEx
user32
LoadStringW
api-ms-win-crt-math-l1-1-0
floor
pow
sin
sqrt
__setusermatherr
cos
tan
modf
ceil
api-ms-win-crt-heap-l1-1-0
_set_new_mode
malloc
free
calloc
_callnewh
api-ms-win-crt-string-l1-1-0
strcpy_s
strcmp
strncpy_s
wcsncmp
_wcsicmp
_stricmp
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
_initterm_e
_get_initial_wide_environment
_initterm
_exit
_c_exit
_cexit
__p___wargv
_initialize_wide_environment
__p___argc
terminate
_crt_atexit
_configure_wide_argv
_register_onexit_function
_initialize_onexit_table
abort
_set_app_type
_seh_filter_exe
exit
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
__stdio_common_vsprintf_s
__stdio_common_vsscanf
__acrt_iob_func
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Exports
Exports
Sections
.text Size: 470KB - Virtual size: 470KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.managed Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 146KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ