Static task
static1
Behavioral task
behavioral1
Sample
64bea46c4c08171739655d07d3880ea6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
64bea46c4c08171739655d07d3880ea6.exe
Resource
win10v2004-20231215-en
General
-
Target
64bea46c4c08171739655d07d3880ea6
-
Size
212KB
-
MD5
64bea46c4c08171739655d07d3880ea6
-
SHA1
65dafa8df28f90640ef09fe2b6e9759436d90fd0
-
SHA256
7086952ccf857daef9c78ac384a1e7cd9fe0122b850b47b83cce986a9a0d0440
-
SHA512
8a1bd20818abc3477c08d70ffc3f9f7d386cafc102f5018d5a7922fac512a211c61d7babc51bde0803dc19895405b3152814e7ffdc8755b8944a8e83ec213128
-
SSDEEP
6144:MIsL976kX6OXHFq66ReJWfdVsnk4cfU40PMYvo:MVZukqeh6RecdCk48HYvo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64bea46c4c08171739655d07d3880ea6
Files
-
64bea46c4c08171739655d07d3880ea6.exe windows:5 windows
314fcef9d5fadae0358fdf3c0ff563da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PeekNamedPipe
FindResourceW
SetConsoleTextAttribute
WaitForSingleObject
GetCommProperties
GetModuleHandleW
GetVersionExW
IsBadWritePtr
lstrlenW
LocalAlloc
VirtualProtect
PurgeComm
lstrlenA
CreateFileA
ReadFile
SetStdHandle
SetFilePointer
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CloseHandle
SetProcessAffinityMask
EnumSystemLocalesW
GetComputerNameA
HeapSize
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
OemToCharW
GetClipboardFormatNameA
SetFocus
SetUserObjectSecurity
SetScrollPos
ShowScrollBar
EnableWindow
GetMonitorInfoW
DefFrameProcW
GetWindowPlacement
gdi32
SetDCPenColor
EndPath
shell32
ShellAboutW
DragAcceptFiles
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ