Static task
static1
Behavioral task
behavioral1
Sample
a770eb43de543b610efacb882d5296e7d90022ac1537066149f8c3fe0544f94f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a770eb43de543b610efacb882d5296e7d90022ac1537066149f8c3fe0544f94f.exe
Resource
win10v2004-20231222-en
General
-
Target
a770eb43de543b610efacb882d5296e7d90022ac1537066149f8c3fe0544f94f
-
Size
262KB
-
MD5
3a0aee0f878a199d49491b0b7df1f6ad
-
SHA1
b1ebed47a1b6cb36c25b459a016753efc0decced
-
SHA256
a770eb43de543b610efacb882d5296e7d90022ac1537066149f8c3fe0544f94f
-
SHA512
59b300e58cd6806863e1960659c61e757ec02d1785c9a0938a7f748a4bb3ff11d28e42793e3f2388ee31f137fa9735a9069719190a70cff09a3f3a81e9617a66
-
SSDEEP
6144:WDnPLQOY0aDp0Duuz4i7T9u8l2oAfuRhOZ3X:WDnP8OYb0Duuz4i7T93l62RhOZ3X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a770eb43de543b610efacb882d5296e7d90022ac1537066149f8c3fe0544f94f
Files
-
a770eb43de543b610efacb882d5296e7d90022ac1537066149f8c3fe0544f94f.exe windows:5 windows x86 arch:x86
f2b80af72653c59d65a74b0188158d9e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileW
DeviceIoControl
GetTickCount
GetLastError
Sleep
GetModuleHandleW
GetProcAddress
SetThreadLocale
GetUserDefaultUILanguage
GetUserDefaultLangID
GetVersionExW
LocalFree
GetModuleFileNameW
GetTempPathW
CopyFileW
DeleteFileW
WideCharToMultiByte
lstrlenW
CreateFileA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
SetFilePointer
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
HeapAlloc
VirtualAlloc
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
user32
SetWindowTextW
GetDlgCtrlID
GetWindow
LoadIconW
ShowWindow
MessageBoxW
LoadStringW
GetWindowTextW
GetDlgItem
SetFocus
GetFocus
GetWindowLongW
FindWindowExW
EndDialog
PostQuitMessage
DialogBoxParamW
DestroyWindow
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
UpdateWindow
SetWindowPos
GetWindowRect
GetSystemMetrics
CreateDialogParamW
SendMessageW
IsWindow
GetParent
shell32
ShellExecuteW
CommandLineToArgvW
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ