Static task
static1
Behavioral task
behavioral1
Sample
242108333d53fba003b7f670ee4be42e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
242108333d53fba003b7f670ee4be42e.exe
Resource
win10v2004-20231222-en
General
-
Target
242108333d53fba003b7f670ee4be42e
-
Size
183KB
-
MD5
242108333d53fba003b7f670ee4be42e
-
SHA1
851a17011284df5ae7788758969c66f9ebd7997d
-
SHA256
b9934c567f85de359217e40acee9f6e340b5691a21c58fe7c33c159f69e2243a
-
SHA512
586d455798a88a195136ac11273b1102eaa87dbc5f968d870001706ce70f064d0abb12a82d2e777825baf7e7bbd5dc29c87063a732e0c77df9d089aa9192d503
-
SSDEEP
3072:9bRP2HdtS6cbW1TJOH7gL7cLJ3wOCtllmoY46WxRh3QgqA:9bRaq6cuTo8LmJ3wKoh5Wn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 242108333d53fba003b7f670ee4be42e
Files
-
242108333d53fba003b7f670ee4be42e.exe windows:5 windows x64 arch:x64
f6584cf5e21363658e5474c1e9a84c5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCloseKey
RegOverridePredefKey
RegOpenKeyExW
kernel32
GetModuleFileNameA
GetModuleHandleExW
GetACP
GetFileType
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
FindResourceW
SizeofResource
LockResource
LoadResource
GetProcAddress
GetModuleHandleW
FindResourceExW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
DecodePointer
GetCommandLineW
GetModuleFileNameW
CloseHandle
GetCurrentProcessId
VirtualQuery
LocalFree
SetLastError
GetCurrentProcess
GetEnvironmentVariableW
FindClose
LoadLibraryW
FreeLibrary
lstrcmpiW
GetTickCount
TerminateProcess
Sleep
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
CreateFileW
GetFileAttributesExW
GetSystemTimeAsFileTime
FlushFileBuffers
GetPrivateProfileIntW
OutputDebugStringA
GetCurrentThreadId
GetPrivateProfileStringW
OutputDebugStringW
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
ExitProcess
IsDebuggerPresent
GetStdHandle
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
EncodePointer
LCMapStringW
GetStringTypeW
GetCPInfo
RtlUnwindEx
RtlPcToFileHeader
LoadLibraryExW
user32
CloseClipboard
OpenClipboard
EmptyClipboard
SetClipboardData
CharLowerBuffW
wsprintfW
MessageBoxW
shlwapi
PathAppendW
PathRemoveFileSpecW
PathStripPathW
PathRemoveExtensionW
shell32
CommandLineToArgvW
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE