@SetFirstEverVice@8
Static task
static1
Behavioral task
behavioral1
Sample
d2c4a4d785762525f6efe42f135bbc6a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d2c4a4d785762525f6efe42f135bbc6a.exe
Resource
win10v2004-20231215-en
General
-
Target
d2c4a4d785762525f6efe42f135bbc6a
-
Size
12.8MB
-
MD5
d2c4a4d785762525f6efe42f135bbc6a
-
SHA1
15cfec193954e00b869ae5e07680eaac5f4b32bc
-
SHA256
1ce1459488e368d249d933f140512403b7293e2aa64173311f80141aec79f5c9
-
SHA512
cdc317151798c4b2e3130bcb34d5ad6255dd39a79dfb79cef915875289ecb4f08412dd09adba42bb938b227716dcaa37a3f298f7da63ed8ab15f5d814c81fa11
-
SSDEEP
196608:tIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII:
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2c4a4d785762525f6efe42f135bbc6a
Files
-
d2c4a4d785762525f6efe42f135bbc6a.exe windows:5 windows x86 arch:x86
a70e187b34266b8bda252cd2ef2d0837
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateTimerQueue
WriteConsoleOutputCharacterW
lstrlenA
GetConsoleAliasesLengthW
EnumDateFormatsExW
GetDefaultCommConfigW
HeapAlloc
_lwrite
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetUserDefaultLCID
SetConsoleScreenBufferSize
SetVolumeMountPointW
GetModuleHandleW
GetConsoleAliasesLengthA
GetCommandLineA
GetEnvironmentStrings
GetConsoleCP
ReadConsoleInputA
WriteConsoleOutputA
GetComputerNameExA
lstrcpynW
GetFileAttributesW
LocalReAlloc
HeapQueryInformation
IsBadWritePtr
GetVolumeNameForVolumeMountPointA
ReadFile
GetTimeZoneInformation
GetConsoleOutputCP
InterlockedExchange
ChangeTimerQueueTimer
SetLastError
GetProcAddress
PeekConsoleInputW
BeginUpdateResourceW
RemoveDirectoryA
EnterCriticalSection
ResetEvent
GetLocalTime
LoadLibraryA
OpenMutexA
WriteConsoleA
SetCalendarInfoW
GlobalGetAtomNameW
GetModuleFileNameA
GetOEMCP
GetConsoleTitleW
BuildCommDCBA
VirtualProtect
GetFileAttributesExW
FindFirstVolumeA
ReleaseMutex
GetCurrentProcessId
GetConsoleProcessList
EnumCalendarInfoExA
GetMailslotInfo
GetSystemDefaultLangID
CreateFileA
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetStartupInfoA
RaiseException
RtlUnwind
GetLastError
WriteFile
GetStdHandle
TerminateProcess
IsDebuggerPresent
HeapFree
LeaveCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
IsValidCodePage
HeapSize
GetLocaleInfoA
GetConsoleMode
FlushFileBuffers
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleW
user32
RealGetWindowClassA
Exports
Exports
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 40.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12.7MB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ