Static task
static1
Behavioral task
behavioral1
Sample
872bae10c60d92571ee605b1150518fdbfadbc180d0e3a8e1f017380ff96601d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
872bae10c60d92571ee605b1150518fdbfadbc180d0e3a8e1f017380ff96601d.exe
Resource
win10-20231129-en
General
-
Target
872bae10c60d92571ee605b1150518fdbfadbc180d0e3a8e1f017380ff96601d
-
Size
549KB
-
MD5
b8c871cc918268d4498166ddbe0030d9
-
SHA1
2be4f44fec871e5c6f7ddcdb5813bdafe0539773
-
SHA256
872bae10c60d92571ee605b1150518fdbfadbc180d0e3a8e1f017380ff96601d
-
SHA512
52c1a549ae6cfd73af5a52cc656345a76ee89d2dda5c53ca8070c1adfef10cd51b86c657265e67f4949f96adc0547b33742e5317e6c8977f72fe6ae8b0a5fcf8
-
SSDEEP
12288:xlh8EiakIw8bm0VCnq1qoMEGz4BEc3C+ssForE4mCi:xlW/T8bm0XqoqWC+qY8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 872bae10c60d92571ee605b1150518fdbfadbc180d0e3a8e1f017380ff96601d
Files
-
872bae10c60d92571ee605b1150518fdbfadbc180d0e3a8e1f017380ff96601d.exe windows:5 windows x86 arch:x86
44b1211815eb04dba3878a847875e976
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasesLengthW
TlsGetValue
SystemTimeToTzSpecificLocalTime
EndUpdateResourceW
InterlockedIncrement
GetCurrentProcess
CreateJobObjectW
OpenSemaphoreA
GetModuleHandleW
GetTickCount
GetWindowsDirectoryA
EnumTimeFormatsW
GlobalAlloc
SetFileShortNameW
GlobalFindAtomA
Sleep
AssignProcessToJobObject
SizeofResource
GetSystemWindowsDirectoryA
FormatMessageW
SetConsoleCursorPosition
CreateFileW
GetVolumePathNameA
LCMapStringA
FindFirstChangeNotificationW
GetLastError
SetLastError
BackupRead
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
EnumDateFormatsExA
SetComputerNameA
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingA
FindFirstVolumeMountPointW
HeapLock
FoldStringW
FindFirstVolumeMountPointA
VirtualProtect
GetVersionExA
DeleteTimerQueueTimer
GlobalAddAtomW
ReadConsoleOutputCharacterW
GetComputerNameA
GetDateFormatW
InterlockedExchange
GetFullPathNameW
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CloseHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
GetModuleFileNameA
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
HeapSize
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
IsDebuggerPresent
HeapFree
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
RtlUnwind
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
RaiseException
user32
GetWindowTextLengthW
gdi32
SetDeviceGammaRamp
advapi32
ReadEventLogA
shell32
ShellAboutW
ole32
CoRegisterPSClsid
winhttp
WinHttpCheckPlatform
msimg32
AlphaBlend
Sections
.text Size: 444KB - Virtual size: 443KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ