Static task
static1
Behavioral task
behavioral1
Sample
137bbe44e4187dfb3094433ff3198971.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
137bbe44e4187dfb3094433ff3198971.exe
Resource
win10v2004-20231201-en
General
-
Target
137bbe44e4187dfb3094433ff3198971
-
Size
11.3MB
-
MD5
137bbe44e4187dfb3094433ff3198971
-
SHA1
1e14b0ac1cfe729f4165e2eb2e134260707b358c
-
SHA256
c52d171e9e0583d4622f7d7e7bf4f0f3eff6825aad3f2119814813fbc605368a
-
SHA512
c8ae75b9fb4aed4e0fd15b3b20bbb270d9f399801636d0f5ffa9f9a02dc49657ae551a66cc457375c6e86347c6a381a9a903f5f8e3702fa76cd7fc567c753125
-
SSDEEP
12288:wFYh3m3EHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHn:wFAm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 137bbe44e4187dfb3094433ff3198971
Files
-
137bbe44e4187dfb3094433ff3198971.exe windows:5 windows x86 arch:x86
f5eb2e4544ad154101347ad148b8b344
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumDateFormatsA
GlobalWire
LocalAlloc
FileTimeToDosDateTime
FreeEnvironmentStringsW
CreateEventW
InterlockedDecrement
CreateIoCompletionPort
GetProcessHeaps
SetProcessWorkingSetSize
GlobalFree
CreateActCtxW
GetStringTypeExA
SetEvent
lstrcpynA
QueryDosDeviceW
WriteConsoleA
lstrcmpiA
VirtualProtect
FindFirstChangeNotificationA
GetCommandLineA
SetCommConfig
SetSystemPowerState
GetLastError
IsBadWritePtr
GetThreadPriority
lstrlenW
EnumDateFormatsExW
GetCPInfo
InterlockedCompareExchange
GetUserDefaultLangID
GetNumaAvailableMemoryNode
FreeConsole
SetDefaultCommConfigW
ReadFile
SetLocalTime
GetCurrentThread
AddConsoleAliasA
DnsHostnameToComputerNameW
GetProfileSectionW
ReplaceFileA
CreateMemoryResourceNotification
SetLastError
GetSystemWindowsDirectoryW
OpenJobObjectW
TerminateProcess
GetCurrentDirectoryW
UpdateResourceW
GetVersionExW
GetStartupInfoA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
RtlUnwind
LoadLibraryA
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
HeapSize
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
GetConsoleOutputCP
WriteConsoleW
CreateFileA
user32
GetCursor
advapi32
GetPrivateObjectSecurity
RegEnumKeyA
DeleteAce
CloseServiceHandle
OpenServiceA
MapGenericMask
IsValidSecurityDescriptor
RegDeleteValueA
IsTokenRestricted
RegQueryInfoKeyA
SetServiceObjectSecurity
RegDeleteValueW
ClearEventLogA
AreAnyAccessesGranted
OpenProcessToken
RegSaveKeyA
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 104.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11.1MB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ