Static task
static1
Behavioral task
behavioral1
Sample
599f90c6b4452e41b47e8b0e505cbafcc7cd0e1b1bd540ef251350614e842b80.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
599f90c6b4452e41b47e8b0e505cbafcc7cd0e1b1bd540ef251350614e842b80.exe
Resource
win10v2004-20231215-en
General
-
Target
599f90c6b4452e41b47e8b0e505cbafcc7cd0e1b1bd540ef251350614e842b80
-
Size
206KB
-
MD5
6f27783ec32da20c1234a920884284f2
-
SHA1
80d06073ad9602e75792f5d8983586b26cf289f0
-
SHA256
599f90c6b4452e41b47e8b0e505cbafcc7cd0e1b1bd540ef251350614e842b80
-
SHA512
c99c45eeceb402a7f8d320531b3d9ea70c0800c820cb5a96ed29a9ac882cb0ac477c83f633c587b2fb83e0b494b1b341848a0963e4a1a5200c71dcddc2c96763
-
SSDEEP
3072:iFdLkfq2k08JCeEZ8htOIMWyF7AkwUZrl8:yFhbMXdrl8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 599f90c6b4452e41b47e8b0e505cbafcc7cd0e1b1bd540ef251350614e842b80
Files
-
599f90c6b4452e41b47e8b0e505cbafcc7cd0e1b1bd540ef251350614e842b80.exe windows:4 windows x64 arch:x64
dcabcd9feb8c6345b995a01d270fcc32
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
kernel32
CompareStringW
CreateProcessW
DelayLoadFailureHook
ExitProcess
FormatMessageW
GetCommandLineW
GetExitCodeProcess
GetModuleHandleW
GetOEMCP
GetProcAddress
GetStdHandle
GetSystemDirectoryW
GetThreadLocale
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrW
IsWow64Process
LocalFree
QueryPerformanceCounter
QueryPerformanceFrequency
ResolveDelayLoadedAPI
WaitForSingleObject
WideCharToMultiByte
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
WriteConsoleW
WriteFile
lstrcmpW
lstrcmpiW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
exit
free
fwrite
getenv
memcmp
memmove
qsort
strchr
strcmp
strcpy
strcspn
strlen
wcscat
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 4KB - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 384B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/14 Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/80 Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/91 Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/102 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ