Static task
static1
Behavioral task
behavioral1
Sample
01a061524ecd494f80807f51c04feabd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01a061524ecd494f80807f51c04feabd.exe
Resource
win10v2004-20231215-en
General
-
Target
01a061524ecd494f80807f51c04feabd
-
Size
284KB
-
MD5
01a061524ecd494f80807f51c04feabd
-
SHA1
6ea3f422c86444f26a78257443a960b262d872b6
-
SHA256
11cd319ca7f4285a87f5d0a49cc9a72186224cbe8eab34494d7f3977f856dacc
-
SHA512
dd78266194da80575be34d47e7ad1ace23a307b6f03badb0ec2e2f482f1b97e9261613ed299d4021b6d685e94316538bdbf8414f072282d92f7c249a833c302e
-
SSDEEP
6144:XoWPqLXWe4PsjB5kosJ5NJw4ejpOGI6OUNSLj2e/V+0pAqzkbD:XoWPqLm/sjB5RsXNJw4ejpOGI6OD2x0I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01a061524ecd494f80807f51c04feabd
Files
-
01a061524ecd494f80807f51c04feabd.exe windows:5 windows x86 arch:x86
9450e7ebedff5de5740711baf39badcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
WriteFile
Sleep
TransactNamedPipe
VerifyVersionInfoA
FileTimeToSystemTime
ReadFile
GetSystemDirectoryA
CreateDirectoryA
GetLastError
WaitNamedPipeA
LoadLibraryA
GetSystemInfo
SetNamedPipeHandleState
SetEnvironmentVariableA
GetModuleFileNameA
CreateMailslotA
GetFileTime
CloseHandle
FindResourceA
LoadResource
SizeofResource
LockResource
VerSetConditionMask
SystemTimeToTzSpecificLocalTime
FreeLibrary
lstrlenA
CreateFileA
GetProcAddress
GetComputerNameA
SetEndOfFile
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
OutputDebugStringW
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
MultiByteToWideChar
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WideCharToMultiByte
HeapSize
EnterCriticalSection
LeaveCriticalSection
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
RaiseException
HeapAlloc
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwind
GetConsoleCP
GetConsoleMode
GetStringTypeW
LCMapStringW
LoadLibraryExW
HeapReAlloc
SetFilePointerEx
ReadConsoleW
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
shell32
SHFileOperationA
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ