Static task
static1
Behavioral task
behavioral1
Sample
30e1234ef3e570667526fdb006832b12.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
30e1234ef3e570667526fdb006832b12.exe
Resource
win10v2004-20231215-en
General
-
Target
30e1234ef3e570667526fdb006832b12
-
Size
913KB
-
MD5
30e1234ef3e570667526fdb006832b12
-
SHA1
01de8ba945945b58824f69553ac0f7b048645d45
-
SHA256
72ea5a2972634a78b4808d2164517dc8dbed4eef24d05d135dbe537e05208bf2
-
SHA512
00bd673f43cba1b16363433e672b30d22196fa0b67c024f970da15270323e545d15b3b990ed1dbbc3e7b9421c3f7840b10621c76203f89e0bcb1214e2a129e4e
-
SSDEEP
24576:Utp7PNBIIr2i1VzBPZYpoEjH2NzQufi9Re+SfM+:uPSiJP+BH2NQufire+SfM+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 30e1234ef3e570667526fdb006832b12
Files
-
30e1234ef3e570667526fdb006832b12.exe windows:6 windows x86 arch:x86
42a0d2d0e703048221ee474fea282f13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
SetThreadPriority
SetFilePointer
CreateMutexW
InitializeCriticalSectionEx
FindClose
CreateFileW
ReleaseMutex
OpenProcess
SetFileAttributesW
CreateToolhelp32Snapshot
Sleep
FormatMessageW
CopyFileA
GetLastError
Process32NextW
Process32FirstW
CloseHandle
RaiseException
DecodePointer
WriteFile
LocalFree
GetFileSize
DeleteCriticalSection
CopyFileW
WideCharToMultiByte
GetConsoleWindow
OpenMutexW
GetDriveTypeW
SetLastError
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThread
GetThreadTimes
SetEndOfFile
WriteConsoleW
SetStdHandle
GetProcessHeap
SetEnvironmentVariableW
GetCurrentProcess
FindNextFileW
SetPriorityClass
FindFirstFileW
ReadFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetThreadPriorityBoost
SetProcessPriorityBoost
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
GetCurrentThreadId
WaitForSingleObjectEx
SwitchToThread
EncodePointer
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
SetEvent
ResetEvent
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
CreateTimerQueue
SignalObjectAndWait
CreateThread
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
FreeLibrary
FreeLibraryAndExitThread
GetModuleFileNameW
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
DuplicateHandle
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LoadLibraryW
WaitForSingleObject
RtlUnwind
ExitProcess
GetModuleHandleExW
ExitThread
MoveFileExW
GetStdHandle
GetCommandLineA
GetCommandLineW
GetFileSizeEx
SetFilePointerEx
GetFileType
HeapAlloc
HeapFree
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
ReadConsoleW
HeapReAlloc
HeapSize
user32
MessageBoxW
ShowWindow
advapi32
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
shell32
SHEmptyRecycleBinW
iphlpapi
GetIpNetTable
ws2_32
inet_ntoa
netapi32
NetShareEnum
NetApiBufferFree
Sections
.text Size: 650KB - Virtual size: 650KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 193KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ