Static task
static1
Behavioral task
behavioral1
Sample
a288d1878fe614fd489f1b4ae60c6083f5f55d3ca88b8fd24efc08f06497a614.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
a288d1878fe614fd489f1b4ae60c6083f5f55d3ca88b8fd24efc08f06497a614.exe
Resource
win10v2004-20231127-en
General
-
Target
a288d1878fe614fd489f1b4ae60c6083f5f55d3ca88b8fd24efc08f06497a614
-
Size
294KB
-
MD5
8190a783bb258313557b34f31aedaf8c
-
SHA1
bd8a50f6c784d98034e484acf277335ead971df2
-
SHA256
a288d1878fe614fd489f1b4ae60c6083f5f55d3ca88b8fd24efc08f06497a614
-
SHA512
4f4529fd8915fc331e90f8fd6566b98f4123f6ba841305ead5ac5064e3b2682216d24dd8134ac619ddbad013b539a1d1af2b14580ecba7eee3c058c4de3c7857
-
SSDEEP
6144:fX9WBbLIGHjYWiipXmPApITpBFbinj3//aqPKeH3Z:fXkIeYWiy4ApId3bcjr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a288d1878fe614fd489f1b4ae60c6083f5f55d3ca88b8fd24efc08f06497a614
Files
-
a288d1878fe614fd489f1b4ae60c6083f5f55d3ca88b8fd24efc08f06497a614.exe windows:5 windows x86 arch:x86
624f00013c1c565988c0a52d012fd6d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
GetStdHandle
WriteFile
GetConsoleMode
SetConsoleMode
ReadConsoleW
WriteConsoleW
LocalFree
GetLastError
SetLastError
Sleep
FormatMessageW
SetConsoleCtrlHandler
GetCurrentProcess
DeviceIoControl
SetFileTime
CloseHandle
RemoveDirectoryW
CreateFileW
DeleteFileW
CreateHardLinkW
GetShortPathNameW
GetLongPathNameW
MoveFileW
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
GetCurrentProcessId
GetDriveTypeW
CreateDirectoryW
SetFileAttributesW
GetFileAttributesW
FindClose
FindFirstFileW
FindNextFileW
InterlockedDecrement
GetVersionExW
GetModuleFileNameW
GetCurrentDirectoryW
FoldStringW
SetErrorMode
FreeLibrary
GetProcAddress
ExitProcess
SetThreadExecutionState
LoadLibraryW
GetModuleHandleW
GetSystemDirectoryW
CompareStringW
AllocConsole
FreeConsole
AttachConsole
GetProcessAffinityMask
CreateThread
SetThreadPriority
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateEventW
CreateSemaphoreW
GetSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
GetCPInfo
IsDBCSLeadByte
MultiByteToWideChar
WideCharToMultiByte
DecodePointer
HeapSize
SetFilePointerEx
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
QueryPerformanceFrequency
GetModuleFileNameA
GetCommandLineA
GetCommandLineW
GetACP
LCMapStringW
HeapFree
HeapAlloc
GetConsoleCP
SetStdHandle
GetStringTypeW
HeapReAlloc
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
ole32
CoCreateInstance
CoSetProxyBlanket
oleaut32
VariantClear
SysFreeString
SysAllocString
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ