Static task
static1
Behavioral task
behavioral1
Sample
3167400f836f1b6e19052fde4fa30fa71b833035f0ec783677a2d9ad5929c50d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3167400f836f1b6e19052fde4fa30fa71b833035f0ec783677a2d9ad5929c50d.exe
Resource
win10-20231215-en
General
-
Target
3167400f836f1b6e19052fde4fa30fa71b833035f0ec783677a2d9ad5929c50d
-
Size
700KB
-
MD5
b35f127391780b4207d5217534ffcc5b
-
SHA1
f2670aa3bd8d78573b7c010e5c56ded813f7faee
-
SHA256
3167400f836f1b6e19052fde4fa30fa71b833035f0ec783677a2d9ad5929c50d
-
SHA512
d765d9ad897e8ce70f521423e348be40a061d20d846e8e501706f65255862dde88221cb2d9c2517fea7a2f9c9f60c8b452d9a05bfda94c04cdfb8e0957f17e16
-
SSDEEP
12288:3ExKfLYBVj7euilbKlD+/CZLJwCAngehhkGVAMKE5vELlShm7n2OR:SnBVudmEgW5LWU8IJY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3167400f836f1b6e19052fde4fa30fa71b833035f0ec783677a2d9ad5929c50d
Files
-
3167400f836f1b6e19052fde4fa30fa71b833035f0ec783677a2d9ad5929c50d.exe windows:5 windows x86 arch:x86
5d0d15f8a90d41c733953b4391318d40
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
UpdateResourceA
CreateJobObjectW
SetComputerNameW
GetComputerNameW
CreateHardLinkA
GetConsoleAliasesLengthA
GetWindowsDirectoryA
GetVolumePathNameW
GlobalFindAtomA
LoadLibraryW
GetConsoleMode
GetSystemWindowsDirectoryA
GetVersionExW
DnsHostnameToComputerNameW
EnumResourceLanguagesA
InterlockedExchange
OpenMutexW
GetLastError
SetLastError
GetStringTypeA
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
RemoveDirectoryA
SetFileAttributesA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
FindFirstVolumeMountPointW
AddAtomW
GetCommMask
GetModuleHandleA
FindFirstChangeNotificationA
GetCurrentProcessId
OpenFileMappingA
SuspendThread
lstrcpyA
HeapCompact
BackupRead
GetComputerNameA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetStartupInfoW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetLocaleInfoA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
WideCharToMultiByte
LCMapStringW
LoadLibraryA
InitializeCriticalSectionAndSpinCount
user32
CharLowerBuffA
gdi32
SetColorAdjustment
GetDeviceGammaRamp
Sections
.text Size: 648KB - Virtual size: 648KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ