Static task
static1
Behavioral task
behavioral1
Sample
d107e9960dd5388f9f121e88d4be78a061527281434b2307e0e84dfac2c92069.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d107e9960dd5388f9f121e88d4be78a061527281434b2307e0e84dfac2c92069.exe
Resource
win10-20231215-en
General
-
Target
d107e9960dd5388f9f121e88d4be78a061527281434b2307e0e84dfac2c92069
-
Size
729KB
-
MD5
911f91e0bf0cec42a13262cbd806d9ad
-
SHA1
16a974f444630c9f76a1f896a6ae1ca550f98853
-
SHA256
d107e9960dd5388f9f121e88d4be78a061527281434b2307e0e84dfac2c92069
-
SHA512
4e6b7ad39b0cc7e00333278049b2766e2ca25be60dc3597f978c41c729b5e8456f18b4451ac4620feb35c878285c941962476d500cb456e2134566af3a3d34bd
-
SSDEEP
12288:SseczeH5CThTWdrxm9+jkPkO3MTYbyOCuiHDxR15DqzMK7I3GQR58qRcR70VQ2D:2czeH5UTWlxmq0VcHD55DqzM8wGcK1Ry
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d107e9960dd5388f9f121e88d4be78a061527281434b2307e0e84dfac2c92069
Files
-
d107e9960dd5388f9f121e88d4be78a061527281434b2307e0e84dfac2c92069.exe windows:5 windows x86 arch:x86
0c89bdd43730f643ee9959ffca65ffd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryDosDeviceA
InterlockedCompareExchange
GetComputerNameW
GetModuleHandleW
GetTickCount
GetCommConfig
VirtualFree
GetConsoleAliasesLengthA
GlobalFindAtomA
LoadLibraryW
SetConsoleMode
GetConsoleAliasW
GetWriteWatch
WriteConsoleW
SetComputerNameExW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
InterlockedDecrement
SetComputerNameA
SetFileAttributesA
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
CreateHardLinkW
FindFirstVolumeMountPointW
TransmitCommChar
AddAtomW
RemoveDirectoryW
SetSystemTime
GetThreadPriority
EnumResourceLanguagesW
GetCurrentProcessId
GlobalReAlloc
DeleteFileA
lstrcpyA
GetStringTypeA
FindFirstChangeNotificationW
WriteConsoleOutputCharacterW
BackupWrite
GetComputerNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RaiseException
HeapFree
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeW
GetLocaleInfoA
HeapSize
gdi32
GetCharABCWidthsFloatA
StrokePath
advapi32
AreAllAccessesGranted
Sections
.text Size: 628KB - Virtual size: 628KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ