Static task
static1
Behavioral task
behavioral1
Sample
376b97e8687bc5989c0a63e18e0e19a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
376b97e8687bc5989c0a63e18e0e19a1.exe
Resource
win10v2004-20231215-en
General
-
Target
376b97e8687bc5989c0a63e18e0e19a1
-
Size
23.1MB
-
MD5
376b97e8687bc5989c0a63e18e0e19a1
-
SHA1
96eb4ebf786ce25eba274471a8f062ff57c0dfe6
-
SHA256
92b9572cb53f7893d1e8fff34c917a767040659037a46f07a305b3494495ca33
-
SHA512
f927e003388c729136cae8b2181458af7eca183cc3ee8a178ace08a1178dfa555484afa735284605bfd09ce08b6c633420fbf7e3ad3f39d6fbb113645252b886
-
SSDEEP
393216:cJSYDIn8UnwpVJS+ZGDP2xZnq0CgFFmRJSYDIn8UnwpVJS+ZGDP2xZnq0CgFFm:KJUnwDJS+cDP22aFmvJUnwDJS+cDP22x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 376b97e8687bc5989c0a63e18e0e19a1
Files
-
376b97e8687bc5989c0a63e18e0e19a1.exe windows:5 windows x64 arch:x64
1f80f1cd81b94f85521db216e293a080
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
MessageBoxA
kernel32
UnhandledExceptionFilter
GetVersionExA
GetProcAddress
LoadLibraryA
GetLastError
ExpandEnvironmentStringsA
GetEnvironmentVariableA
SetEnvironmentVariableA
GetShortPathNameW
GetTempPathW
Sleep
LoadLibraryExA
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetCommandLineW
GetStartupInfoW
GetStdHandle
GetModuleFileNameW
HeapSize
RtlUnwindEx
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryA
GetCurrentProcessId
DeleteFileA
RemoveDirectoryA
FindNextFileA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DecodePointer
EncodePointer
SetConsoleCtrlHandler
GetModuleHandleW
ExitProcess
HeapReAlloc
GetDriveTypeW
GetFullPathNameA
GetFileAttributesA
GetCommandLineA
TerminateProcess
GetCurrentProcess
CompareStringW
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CloseHandle
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
FlsGetValue
FlsSetValue
FlsFree
SetLastError
GetCurrentThreadId
FlsAlloc
HeapSetInformation
GetVersion
HeapCreate
WriteFile
SetHandleCount
DeleteCriticalSection
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
ReadFile
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
LoadLibraryW
CreateFileW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
FlushFileBuffers
WriteConsoleW
GetStringTypeW
ws2_32
ntohl
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.l2 Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
_pyi_bootstrap.pyc
-
coordinater_last.pyc
-
pyi_carchive.pyc