Static task
static1
Behavioral task
behavioral1
Sample
a869d33f53ab180e5ebf349c790b9dc6590abf853fc0a30c8d2b5e6a1ccb7df6.exe
Resource
win7-20231129-en
General
-
Target
a869d33f53ab180e5ebf349c790b9dc6590abf853fc0a30c8d2b5e6a1ccb7df6
-
Size
259KB
-
MD5
5c39cb5b7fd666cc9f5552394377b993
-
SHA1
f0118001277e43f402b97a5b6050f48ce2fa91ea
-
SHA256
a869d33f53ab180e5ebf349c790b9dc6590abf853fc0a30c8d2b5e6a1ccb7df6
-
SHA512
529e2f76d1179817dabd15ece348ba7ab4506a96ef5cb0736022db7ee1c4115e65edae71d7f8a8cd9675923498e89cfebf9d48ecc0e47f40d6827c6c5f42f931
-
SSDEEP
6144:t9cHPTSTsL+b+/PYkjR+IFftdZdJ4pgc6CmGUgd0:t9SwY+b4/RbTDJ48cUK0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a869d33f53ab180e5ebf349c790b9dc6590abf853fc0a30c8d2b5e6a1ccb7df6
Files
-
a869d33f53ab180e5ebf349c790b9dc6590abf853fc0a30c8d2b5e6a1ccb7df6.exe windows:5 windows x86 arch:x86
bb26571ecd47dbc4f88b0a41f639cfa9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetFileSize
GetCommModemStatus
FindFirstFileW
WriteConsoleInputW
WriteConsoleOutputCharacterW
BuildCommDCBAndTimeoutsA
WriteConsoleOutputW
InterlockedIncrement
ReadConsoleA
ZombifyActCtx
SetDefaultCommConfigW
GetNamedPipeHandleStateA
GetProfileSectionA
GetComputerNameW
GetProcessPriorityBoost
GetModuleHandleW
LocalFlags
GetPrivateProfileStringW
CreateActCtxW
GlobalAlloc
GetVolumeInformationA
GlobalFindAtomA
TerminateThread
DeleteVolumeMountPointW
InterlockedPopEntrySList
SetProcessAffinityMask
GetConsoleAliasW
SetTimeZoneInformation
ReplaceFileA
CreateJobObjectA
GetLargestConsoleWindowSize
FindFirstFileA
SetLastError
GetProcAddress
SetFirmwareEnvironmentVariableW
VerLanguageNameW
LoadLibraryA
OpenWaitableTimerW
FoldStringA
WriteProfileStringA
GetProcessShutdownParameters
OpenFileMappingW
GetFileTime
PeekConsoleInputA
GetCPInfoExA
SetProcessShutdownParameters
OpenSemaphoreW
ReadConsoleInputW
GetWindowsDirectoryW
MoveFileWithProgressW
CloseHandle
WriteConsoleW
SetStdHandle
GlobalFlags
GetCommandLineW
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapReAlloc
ExitProcess
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
IsProcessorFeaturePresent
HeapCreate
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetLocaleInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CreateFileW
user32
CharUpperW
CharToOemBuffA
advapi32
RevertToSelf
Sections
.text Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ