Static task
static1
Behavioral task
behavioral1
Sample
590c3c69ea210a2310bffc0010e9f38a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
590c3c69ea210a2310bffc0010e9f38a.exe
Resource
win10v2004-20231215-en
General
-
Target
590c3c69ea210a2310bffc0010e9f38a
-
Size
179KB
-
MD5
590c3c69ea210a2310bffc0010e9f38a
-
SHA1
70a06a0aa65927459f71669ab13159f66546db0c
-
SHA256
e128805aa4bbcc74e4bf46cf92666234918803def1ed7ce099c207a28ebfe357
-
SHA512
9ff2115b8afe3522e8a60d0b21564bddfea530a6f5d1cb95a0634136872f3b4d64ad4e66254a098ca1ba585c7cac62f6921ede0a8c307b81722fae65596f51b4
-
SSDEEP
3072:Qk6XDLgUyPHhtarORS1jCWjGRZi/9m1MC/MTatNQbtOxSt:Qk6/xMt2jlRjGni4r/MToN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 590c3c69ea210a2310bffc0010e9f38a
Files
-
590c3c69ea210a2310bffc0010e9f38a.exe windows:1 windows x86 arch:x86
b79949168081db5b97f8e433f6a39f2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadReadPtr
WriteConsoleA
GetLogicalDriveStringsA
_lwrite
ResetEvent
GetConsoleTitleA
LocalFlags
GetCommTimeouts
VirtualAlloc
GetShortPathNameA
ExitVDM
FindAtomA
GetNumberOfConsoleInputEvents
CloseHandle
GetExitCodeProcess
SetLocalPrimaryComputerNameA
GetThreadPriorityBoost
SetConsoleCursorMode
CancelTimerQueueTimer
FlushConsoleInputBuffer
ReadConsoleA
SetFileAttributesA
GetConsoleCharType
GetSystemDirectoryA
GetWindowsDirectoryA
GetConsoleCP
IsProcessorFeaturePresent
GetComputerNameA
QueryPerformanceCounter
GetExitCodeThread
CompareFileTime
IsValidCodePage
SetConsoleDisplayMode
GetVersionExA
GetConsoleFontSize
_lopen
CreateFileMappingW
EnumResourceNamesA
GetDllDirectoryA
GetDefaultCommConfigA
GetCommandLineA
IsBadCodePtr
GetWriteWatch
ReadConsoleInputA
SetEndOfFile
WriteConsoleOutputAttribute
ClearCommError
OpenThread
Process32First
GetSystemTime
WaitForDebugEvent
DeleteTimerQueueEx
GetFullPathNameA
GetConsoleMode
DeleteTimerQueueTimer
EnumUILanguagesA
WriteProfileStringA
SetCommTimeouts
CreateThread
Module32First
GetCurrentThreadId
GetTempPathA
lstrcmpA
TermsrvAppInstallMode
SetThreadAffinityMask
LocalShrink
RemoveDirectoryA
SetThreadIdealProcessor
GetConsoleCharType
GlobalGetAtomNameA
GetConsoleOutputCP
TransactNamedPipe
HeapFree
CommConfigDialogA
CancelWaitableTimer
ReadConsoleA
EnumSystemCodePagesA
VirtualAllocEx
OpenProfileUserMapping
ConnectNamedPipe
WriteConsoleOutputAttribute
GetConsoleCommandHistoryLengthA
SetProcessPriorityBoost
GetThreadLocale
CreateWaitableTimerA
GetProcessHeap
GetDiskFreeSpaceA
EnumResourceLanguagesA
SearchPathA
GlobalGetAtomNameA
GetFileType
QueryDosDeviceA
SetLastError
GetCompressedFileSizeA
SetTapeParameters
SetPriorityClass
SetCalendarInfoA
GetDriveTypeA
OpenSemaphoreA
GetEnvironmentStringsA
ClearCommError
DeleteTimerQueueEx
OpenEventA
SetThreadUILanguage
OutputDebugStringA
OpenSemaphoreA
OpenFile
OpenWaitableTimerA
CallNamedPipeA
LoadLibraryExA
SetLastConsoleEventActive
CallNamedPipeA
RegisterWaitForInputIdle
ExitProcess
GetPrivateProfileStructA
HeapSize
ExpandEnvironmentStringsA
lstrcmpiA
GetFileInformationByHandle
WriteConsoleInputA
GetCommMask
SetVDMCurrentDirectories
SetEvent
CreateMutexA
ExpungeConsoleCommandHistoryA
LocalCompact
ResumeThread
SetConsoleHardwareState
GetConsoleAliasesLengthW
ReadConsoleOutputCharacterA
GetProcessHeap
GetProcessHandleCount
ntdll
RtlGetLastWin32Error
user32
DestroyWindow
advapi32
AddAccessDeniedAceEx
Sections
.text Size: 44KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 101KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ